SB2017111404 - Information disclosure in Adobe Digital Editions



SB2017111404 - Information disclosure in Adobe Digital Editions

Published: November 14, 2017

Security Bulletin ID SB2017111404
Severity
Low
Patch available
YES
Number of vulnerabilities 6
Exploitation vector Remote access
Highest impact Information disclosure

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 6 secuirty vulnerabilities.


1) XXE attack (CVE-ID: CVE-2017-11273)

The vulnerability allows a remote attacker to conduct XXE attack.

The weakness exists in the encryption library due to improper handling of XML External Entity (XXE) entries when parsing an XML file. A remote attacker can send manipulated XML data and disclose file contents from a server or connected network.

2) Out-of-bounds read (CVE-ID: CVE-2017-11297)

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The weakness exists due to out-of-bounds read. A remote attacker can disclose memory address and gain access to arbitrary data.

3) Out-of-bounds read (CVE-ID: CVE-2017-11298)

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The weakness exists due to out-of-bounds read. A remote attacker can disclose memory address and gain access to arbitrary data.

4) Out-of-bounds read (CVE-ID: CVE-2017-11299)

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The weakness exists due to out-of-bounds read. A remote attacker can disclose memory address and gain access to arbitrary data.

5) Out-of-bounds read (CVE-ID: CVE-2017-11300)

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The weakness exists due to out-of-bounds read. A remote attacker can disclose memory address and gain access to arbitrary data.

6) Memory corruption (CVE-ID: CVE-2017-11301)

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The weakness exists due to boundary error. A remote attacker can trigger memory corruption, disclose memory address and gain access to arbitrary data.

Remediation

Install update from vendor's website.