SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


Try our Premium Alert Service
 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service





Category:   Application (Generic)  >   Adobe Acrobat/Reader Vendors:   Adobe Systems Incorporated
Adobe Acrobat/Reader Multiple Flaws Let Remote Users Bypass Security, Obtain Potentially Sensitive Information, and Execute Arbitrary Code
SecurityTracker Alert ID:  1040920
SecurityTracker URL:  http://securitytracker.com/id/1040920
CVE Reference:   CVE-2018-4947, CVE-2018-4948, CVE-2018-4949, CVE-2018-4950, CVE-2018-4951, CVE-2018-4952, CVE-2018-4953, CVE-2018-4954, CVE-2018-4955, CVE-2018-4956, CVE-2018-4957, CVE-2018-4958, CVE-2018-4959, CVE-2018-4960, CVE-2018-4961, CVE-2018-4962, CVE-2018-4963, CVE-2018-4964, CVE-2018-4965, CVE-2018-4966, CVE-2018-4967, CVE-2018-4968, CVE-2018-4969, CVE-2018-4970, CVE-2018-4971, CVE-2018-4972, CVE-2018-4973, CVE-2018-4974, CVE-2018-4975, CVE-2018-4976, CVE-2018-4977, CVE-2018-4978, CVE-2018-4979, CVE-2018-4980, CVE-2018-4981, CVE-2018-4982, CVE-2018-4983, CVE-2018-4984, CVE-2018-4985, CVE-2018-4986, CVE-2018-4987, CVE-2018-4988, CVE-2018-4989, CVE-2018-4990, CVE-2018-4993, CVE-2018-4995, CVE-2018-4996   (Links to External Site)
Date:  May 16 2018
Impact:   Disclosure of system information, Disclosure of user information, Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  Exploit Included:  Yes  

Description:   Multiple vulnerabilities were reported in Adobe Acrobat/Reader. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can bypass security controls on the target system. A remote user can obtain potentially sensitive information on the target system.

A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target user's system.

A double-free memory error may occur [CVE-2018-4990].

[Editor's note: This vulnerability is being actively

A heap overflow may occur [CVE-2018-4947, CVE-2018-4948, CVE-2018-4966, CVE-2018-4968, CVE-2018-4978, CVE-2018-4982, CVE-2018-4984].

A use-after-free memory error may occur [CVE-2018-4996, CVE-2018-4952, CVE-2018-4954, CVE-2018-4958, CVE-2018-4959, CVE-2018-4961, CVE-2018-4971, CVE-2018-4974, CVE-2018-4977, CVE-2018-4980, CVE-2018-4983, CVE-2018-4988, CVE-2018-4989].

An out-of-bounds memory write error may occur [CVE-2018-4950].

A type confusion error may occur [CVE-2018-4953].

An untrusted pointer dereference may occur [CVE-2018-4987].

A remote user can view potentially sensitive information on the target system.

A security bypass error may occur [CVE-2018-4979].

An out-of-bounds memory read error may occur [CVE-2018-4949, CVE-2018-4951, CVE-2018-4955, CVE-2018-4956, CVE-2018-4957, CVE-2018-4960, CVE-2018-4962, CVE-2018-4963, CVE-2018-4964, CVE-2018-4967, CVE-2018-4969, CVE-2018-4970, CVE-2018-4972, CVE-2018-4973, CVE-2018-4975, CVE-2018-4976, CVE-2018-4981, CVE-2018-4986, CVE-2018-4985].

[Editor's note: The vendor reports that demonstration exploit code for CVE-2018-4985 is publicly available.]

A memory corruption error may occur [CVE-2018-4965].

An NTLM SSO hash theft may occur [CVE-2018-4993].

A remote user can submit a specially crafted HTTP POST request to inject a newline and bypass security [CVE-2018-4995].

AbdulAziz Hariri via Trend Micro's Zero Day Initiative, Aleksandar Nikolic of Cisco Talos, Alex from Cure53, an anonymous reporter via Trend Micro's Zero Day Initiative, Anton Cherepanov, ESET and Matt Oh, Microsoft, Assaf Baharav, Yaron Fruchtmann and Ido Solomon of Check Point Software Technologies, Cybellum Technologies LTD, Gal De Leon of Palo Alto Networks, Hui Gao of Palo Alto Networks and Heige from Knownsec 404 Security Team, Ke Liu of Tencent's Xuanwu LAB working via Trend Micro's Zero Day Initiative, Riusksk of Tencent Security Platform Department via Trend Micro's Zero Day Initiative, Sebastian Apelt siberas via Trend Micro's Zero Day Initiative, Steven Seeley via Trend Micro's Zero Day Initiative, Vladislav Stolyarov of Kaspersky Lab, WillJ of Tencent PC Manager via Trend Micro's Zero Day Initiative, and Yoav Alon and Netanel Ben-Simon from Check Point Software Technologies reported these vulnerabilities.

Impact:   A remote user can create content that, when loaded by the target user, will execute arbitrary code on the target user's system.

A remote user can bypass security controls on the target system.

A remote user can obtain potentially sensitive information on the target system.

Solution:   The vendor has issued a fix (2015.006.30418, 2017.011.30080, 2018.011.20040).

The vendor advisory is available at:

https://helpx.adobe.com/security/products/acrobat/apsb18-09.html

Vendor URL:  helpx.adobe.com/security/products/acrobat/apsb18-09.html (Links to External Site)
Cause:   Access control error, Boundary error
Underlying OS:  UNIX (macOS/OS X), Windows (Any)

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2018, SecurityGlobal.net LLC