SB2020051221 - Multiple vulnerabilities in Adobe Acrobat and Reader



SB2020051221 - Multiple vulnerabilities in Adobe Acrobat and Reader

Published: May 12, 2020

Security Bulletin ID SB2020051221
Severity
High
Patch available
YES
Number of vulnerabilities 24
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 50% Low 50%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 24 secuirty vulnerabilities.


1) NULL pointer dereference (CVE-ID: CVE-2020-9610)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error. A remote attacker can trick the victim to open a specially crafted PDF file and crash the application.


2) Out-of-bounds read (CVE-ID: CVE-2020-9602)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition. A remote attacker can create a specially crafted PDF file, trick the victim into opening it, trigger out-of-bounds read error and read contents of memory on the system.


3) Invalid memory access (CVE-ID: CVE-2020-9593)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to invalid memory access issue. A remote attacker can create a specially crafted PDF file, trick the victim into opening it and read contents of memory on the system.


4) Invalid memory access (CVE-ID: CVE-2020-9595)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to invalid memory access issue. A remote attacker can create a specially crafted PDF file, trick the victim into opening it and read contents of memory on the system.


5) Invalid memory access (CVE-ID: CVE-2020-9598)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to invalid memory access issue. A remote attacker can create a specially crafted PDF file, trick the victim into opening it and read contents of memory on the system.


6) Use-after-free (CVE-ID: CVE-2020-9606)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error within the handling of Field objects. A remote attacker can create a specially crafted PDF file, trick the victim into opening it, trigger a use-after-free error and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


7) Use-after-free (CVE-ID: CVE-2020-9607)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing destruction of annotations from inside event handlers. A remote attacker can create a specially crafted PDF file, trick the victim into opening it, trigger a use-after-free error and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


8) Buffer overflow (CVE-ID: CVE-2020-9604)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error. A remote attacker can create a specially crafted PDF file, trick the victim into opening it, trigger buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


9) Buffer overflow (CVE-ID: CVE-2020-9605)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error. A remote attacker can create a specially crafted PDF file, trick the victim into opening it, trigger buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


10) Out-of-bounds read (CVE-ID: CVE-2020-9599)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition. A remote attacker can create a specially crafted PDF file, trick the victim into opening it, trigger out-of-bounds read error and read contents of memory on the system.


11) Out-of-bounds read (CVE-ID: CVE-2020-9600)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition. A remote attacker can create a specially crafted PDF file, trick the victim into opening it, trigger out-of-bounds read error and read contents of memory on the system.


12) Out-of-bounds read (CVE-ID: CVE-2020-9601)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition. A remote attacker can create a specially crafted PDF file, trick the victim into opening it, trigger out-of-bounds read error and read contents of memory on the system.


13) Out-of-bounds read (CVE-ID: CVE-2020-9603)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition. A remote attacker can create a specially crafted PDF file, trick the victim into opening it, trigger out-of-bounds read error and read contents of memory on the system.


14) Heap-based buffer overflow (CVE-ID: CVE-2020-9612)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error within the processing of JPEG2000 images. A remote attacker can create a specially crafted PDF file, trick the victim into opening it, trigger heap-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


15) Out-of-bounds read (CVE-ID: CVE-2020-9608)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition. A remote attacker can create a specially crafted PDF file, trick the victim into opening it, trigger out-of-bounds read error and read contents of memory on the system.


16) Out-of-bounds read (CVE-ID: CVE-2020-9609)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition when processing unicode strings within the Javascript submitForm function. A remote attacker can create a specially crafted PDF file, trick the victim into opening it, trigger out-of-bounds read error and read contents of memory on the system.


17) Stack exhaustion (CVE-ID: CVE-2020-9611)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a stack exhaustion issue. A remote attacker can trick the victim to open a specially crafted PDF file and crash the application.


18) Security restrictions bypass (CVE-ID: CVE-2020-9592)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a unspecified error. A remote attacker can create a specially crafted PDF file, trick the victim into opening it and bypass implemented security restrictions.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


19) Security restrictions bypass (CVE-ID: CVE-2020-9596)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a unspecified error. A remote attacker can create a specially crafted PDF file, trick the victim into opening it and bypass implemented security restrictions.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


20) Security restrictions bypass (CVE-ID: CVE-2020-9613)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a unspecified error. A remote attacker can create a specially crafted PDF file, trick the victim into opening it and bypass implemented security restrictions.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


21) Security restrictions bypass (CVE-ID: CVE-2020-9614)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a unspecified error. A remote attacker can create a specially crafted PDF file, trick the victim into opening it and bypass implemented security restrictions.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


22) Out-of-bounds write (CVE-ID: CVE-2020-9594)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error. A remote attacker can create a specially crafted PDF file, trick the victim into opening it, trigger out-of-bounds write and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


23) Out-of-bounds write (CVE-ID: CVE-2020-9597)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error within the parsing of JPEG files. A remote attacker can create a specially crafted PDF file, trick the victim into opening it, trigger out-of-bounds write and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


24) Race condition (CVE-ID: CVE-2020-9615)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a race condition. A remote attacker can create a specially crafted PDF file, trick the victim into opening it and bypass implemented security restrictions.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


Remediation

Install update from vendor's website.