• Services
    • Asses
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Transform
      • SOC Consultancy
      •     SOC Maturity Assessment
      •     SOC Model Evaluation
      •     SOC Gap Analysis
      •     SIEM Gap Analysis
      •     SIEM Optimization
      •     SOC Content Pack
    • Train
      • Security Awareness and Training
      • Tabletop Exercise
      • Simulated Cyber Attack Exercises
    • Respond
      • Incident Response
      • Incident Analysis
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
Rewterz Threat Advisory – Cobalt Bank Robbers Use New ThreadKit Malicious Doc Builder
December 14, 2018
Rewterz Threat Advisory – Microsoft Internet Explorer Multiple Vulnerabilities
December 14, 2018

Rewterz Threat Advisory – Adobe Reader / Acrobat Multiple Vulnerabilities

December 14, 2018

SEVERITY : Medium

 

 

CATEGORY: Vulnerability

 

 

PUBLISH DATE: December 14, 2018

 

 

ANALYSIS SUMMARY

 

 

A total of 89 vulnerabilities have been reported in Adobe Reader and Adobe Acrobat, which can be exploited by malicious people to disclose potentially sensitive information, or bypass certain security restrictions, and compromise a vulnerable system.

  • Multiple errors related to Buffer Errors can be exploited to execute arbitrary code.
  • Multiple unspecified errors can be exploited to dereference an untrusted pointer and subsequently execute arbitrary code.
  • An error related to the Onix Indexing attack surface can be exploited to gain elevated privileges.
  • An unspecified error can be exploited to bypass certain JavaScript API restrictions.
  • Numerous use-after-free errors can be exploited to execute arbitrary code.
  • Multiple boundary errors can be exploited to trigger an out-of-bounds write memory access and subsequently execute arbitrary code.
  • Multiple unspecified errors can be exploited to cause a heap-based buffer overflow and subsequently execute arbitrary code.
  • Multiple boundary errors can be exploited to trigger an out-of-bounds read memory access.
  • Multiple integer overflow errors can be exploited to disclose certain memory contents.
  • An unspecified error can be exploited to disclose otherwise restricted information.

 

 

Impact

 

Information Disclosure

Security Bypass

Privilege Escalation

Code Execution

 

Affected Vendors

 

Adobe

 

Affected Products

 

 

Adobe Acrobat DC 15.x

Adobe Acrobat Reader DC 15.x

Adobe Acrobat 2017 17.x

Adobe Acrobat Reader 2017 17.x

Adobe Acrobat Reader DC 19.x

Adobe Acrobat DC 19.x

 

Remediation

 

Update to a fixed version.

Acrobat DC / Acrobat Reader DC 2019 running on Windows and macOS:

Update to version 2019.010.20064.

 

Acrobat 2017 / Acrobat Reader DC 2017 running on Windows and macOS:

Update to version 2017.011.30110.

 

Acrobat DC / Acrobat Reader DC (Classic 2015) running on Windows and macOS:

Update to version 2015.006.30461.

  • Services
    • Asses
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Respond
      • Incident Response
      • Incident Analysis
  • Transform
    • SOC Consultancy
    •     SOC Maturity Assessment
    •     SOC Model Evaluation
    •     SOC Gap Analysis
    •     SIEM Gap Analysis
    •     SIEM Optimization
    •     SOC Content Pack
  • Train
    • Security Awareness and Training
    • Tabletop Exercise
    • Simulated Cyber Attack Exercises
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
COPYRIGHT © REWTERZ. ALL RIGHTS RESERVED.