HomePentest-Tools.com Logo

Adobe Reader Security Updates(apsb16-33) - Mac OS X CVE-2016-1089CVE-2016-1091CVE-2016-6939CVE-2016-6940CVE-2016-6941CVE-2016-6942CVE-2016-6943CVE-2016-6944CVE-2016-6945CVE-2016-6946CVE-2016-6947CVE-2016-6948CVE-2016-6949CVE-2016-6950CVE-2016-6951CVE-2016-6952CVE-2016-6953CVE-2016-6954CVE-2016-6955CVE-2016-6956CVE-2016-6957CVE-2016-6958CVE-2016-6959CVE-2016-6960CVE-2016-6961CVE-2016-6962CVE-2016-6963CVE-2016-6964CVE-2016-6965CVE-2016-6966CVE-2016-6967CVE-2016-6968CVE-2016-6969CVE-2016-6970CVE-2016-6971CVE-2016-6972CVE-2016-6973CVE-2016-6974CVE-2016-6975CVE-2016-6976CVE-2016-6977CVE-2016-6978CVE-2016-6979CVE-2016-6988CVE-2016-6993CVE-2016-6994CVE-2016-6995CVE-2016-6996CVE-2016-6997CVE-2016-6998CVE-2016-6999CVE-2016-7000CVE-2016-7001CVE-2016-7002CVE-2016-7003CVE-2016-7004CVE-2016-7005CVE-2016-7006CVE-2016-7007CVE-2016-7008CVE-2016-7009CVE-2016-7010CVE-2016-7011CVE-2016-7012CVE-2016-7013CVE-2016-7014CVE-2016-7015CVE-2016-7016CVE-2016-7017CVE-2016-7018CVE-2016-7019CVE-2016-7854CVE-2016-7853CVE-2016-7852

Severity
CVSSv3 Score
9.8
Vulnerability description

Adobe Reader is prone to multiple vulnerabilities.

Risk description

Multiple flaws exist due to: - An use-after-free vulnerabilities. - The heap buffer overflow vulnerabilities. - The memory corruption vulnerabilities. - An integer overflow vulnerability. Successful exploitation of this vulnerability will allow remote attackers lead to code execution and to bypass restrictions on Javascript API execution.

Recommendation

Upgrade to Adobe Reader version 11.0.18 or later.

Codename
Not available
Detectable with
Network Scanner
Scan engine
OpenVAS
Exploitable with Sniper
No
CVE Published
Oct 13, 2016
Detection added at
Software Type
Not available
Vendor
Not available
Product
Not available