An integer overflow vulnerability exists in Adobe Acrobat Reader. The vulnerability is due to improper validation of the parameters for a certain function. A remote attacker could exploit this vulnerability by enticing a user to open a maliciously crafted document. Successful exploitation of the vulnerability can possibly lead to remote code execution.
Category Archives: Checkpoint
Checkpoint
Adobe Acrobat and Reader Use After Free (APSB16-14: CVE-2016-1056; CVE-2016-1056)
A remote code execution vulnerability exists in Adobe Acrobat and Reader. The vulnerability is due to a use-after-free error in Adobe Acrobat and Reader while handling a specially crafted PDF file. A remote attacker can exploit this vulnerability by enticing a target user to open a specially crafted PDF file.
Adobe Acrobat and Reader JPEG codec Memory Corruption (APSB16-14: CVE-2016-1063; CVE-2016-1063)
A memory corruption vulnerability exists in Adobe Reader and Acrobat. The vulnerability is due to an error in Adobe Reader and Acrobat while parsing a maliciously crafted PDF file with an embedded malformed JPEG. A remote attacker may exploit this vulnerability by enticing a target user to open a specially crafted file.
Adobe Reader Memory Corruption (APSB16-26: CVE-2016-4204; CVE-2016-4204)
A memory corruption vulnerability exists in Adobe Reader and Acrobat. The vulnerability is due to out-of-bounds error while accessing to unintended memory in a specially crafted PDF file. A remote attacker can exploit this vulnerability by enticing a target user to open a specially crafted PDF file.
Adobe Acrobat and Reader Memory Corruption (APSB14-15: CVE-2016-1067; CVE-2016-1067; CVE-2016-1068; CVE-2016-1069)
This vulnerability is an instance of a use after free vulnerability. A constraint for exploitation of this vulnerability is that the memory area of the freed object is reused by another object. A remote attacker may exploit this vulnerability by enticing a target user to open a specially crafted PDF file.
Adobe Flash Player Memory Corruption (APSB16-25: CVE-2016-4188; CVE-2016-4188)
A memory corruption vulnerability exists in Adobe Flash Player. The vulnerability is due to an error in Adobe Flash Player while parsing a specially crafted SWF file. A remote attacker can exploit this issue by enticing a victim to open a specially crafted SWF file.
Adobe Acrobat and Reader Use-After-Free (APSB16-14: CVE-2016-1066; CVE-2016-1066)
A use after free vulnerability exists in Adobe Acrobat and Reader. The vulnerability is due to an error in the way Adobe Acrobat and Reader handles objects in memory. A remote attacker can exploit this vulnerability by enticing the user to open a specially crafted PDF file.
Adobe Flash Player Use After Free Code Execution (APSB16-25: CVE-2016-4248; CVE-2016-4248)
A remote code execution vulnerability exists in Adobe Flash Player. The vulnerability is due to a use-after-free error in Adobe Flash Player while handling a specially crafted SWF file. A remote attacker can exploit this vulnerability by enticing a target user to open a specially crafted SWF file with an affected version of Flash Player.
Adobe Flash Player Use After Free Code Execution (APSB16-25: CVE-2016-4222; CVE-2016-4222)
A remote code execution vulnerability exists in Adobe Flash Player. The vulnerability is due to a use-after-free error in Adobe Flash Player while handling a specially crafted SWF file. A remote attacker can exploit this vulnerability by enticing a target user to open a specially crafted SWF file with an affected version of Flash Player.
Adobe Flash Player Memory Corruption (APSB16-25: CVE-2016-4232; CVE-2016-4232)
A memory leak vulnerability exists in Adobe Flash Player. The vulnerability is due to a dangling reference error in Adobe Flash Player while handling a specially crafted SWF file. A remote attacker can exploit this vulnerability by enticing a target user to open a specially crafted SWF file with an affected version of Flash Player.