HomePentest-Tools.com Logo

Adobe Reader DC (Classic Track) Security Updates (apsb17-11) - Windows CVE-2017-3011CVE-2017-3012CVE-2017-3013CVE-2017-3014CVE-2017-3015CVE-2017-3018CVE-2017-3019CVE-2017-3020CVE-2017-3021CVE-2017-3022CVE-2017-3024CVE-2017-3025CVE-2017-3026CVE-2017-3027CVE-2017-3028CVE-2017-3030CVE-2017-3031CVE-2017-3032CVE-2017-3033CVE-2017-3034CVE-2017-3036CVE-2017-3037CVE-2017-3038CVE-2017-3039CVE-2017-3040CVE-2017-3042CVE-2017-3043CVE-2017-3044CVE-2017-3045CVE-2017-3046CVE-2017-3048CVE-2017-3049CVE-2017-3050CVE-2017-3051CVE-2017-3052CVE-2017-3054CVE-2017-3055CVE-2017-3056CVE-2017-3057CVE-2017-3065CVE-2017-3035CVE-2017-3047CVE-2017-3017CVE-2017-3023CVE-2017-3041CVE-2017-3029CVE-2017-3053

Severity
CVSSv3 Score
7.8
Vulnerability description

Adobe Reader DC (Classic Track) is prone to multiple vulnerabilities.

Risk description

Multiple flaws exist due to: - An use-after-free vulnerabilities. - The heap buffer overflow vulnerabilities. - A memory corruption vulnerabilities. - An integer overflow vulnerabilities. Successful exploitation will allow attackers to execute arbitrary code in the context of the user running the affected applications. Failed exploit attempts will likely cause a denial-of-service condition.

Recommendation

Upgrade to Adobe Reader DC (Classic Track) version 2015.006.30306 or later.

Codename
Not available
Detectable with
Network Scanner
Scan engine
OpenVAS
Exploitable with Sniper
No
CVE Published
Apr 12, 2017
Detection added at
Software Type
Not available
Vendor
Not available
Product
Not available