cnvd-2018-05055
Vulnerability from cnvd
Title
多款Adobe产品XFA引擎内存错误引用漏洞
Description
Acrobat DC Continuous Track等都是美国奥多比(Adobe)公司的产品。Acrobat DC Continuous Track是一款桌面版PDF解决方案的连续更新版本。Reader DC Continuous Track是一款PDF阅读工具的连续更新版本。XFA engine是其中的一个XFA引擎。 多款Adobe产品中的XFA引擎存在内存错误引用漏洞。远程攻击者可利用该漏洞执行任意代码。
Severity
Patch Name
多款Adobe产品XFA引擎内存错误引用漏洞的补丁
Patch Description
Acrobat DC Continuous Track等都是美国奥多比(Adobe)公司的产品。Acrobat DC Continuous Track是一款桌面版PDF解决方案的连续更新版本。Reader DC Continuous Track是一款PDF阅读工具的连续更新版本。XFA engine是其中的一个XFA引擎。 多款Adobe产品中的XFA引擎存在内存错误引用漏洞。远程攻击者可利用该漏洞执行任意代码。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description

厂商已发布漏洞修复程序,请及时关注更新: https://helpx.adobe.com/security/products/acrobat/apsb18-02.html

Reference
https://helpx.adobe.com/security/products/acrobat/apsb18-02.html
Impacted products
Name
['Adobe Acrobat DC (Continuous Track) <=2018.009.20050', 'Adobe Acrobat Reader DC (Continuous Track) <=2018.009.20050', 'Adobe Acrobat 2017 <=2017.011.30070', 'Adobe Acrobat Reader 2017 <=2017.011.30070', 'Adobe Acrobat Reader DC (Classic Track) <=2015.006.30394', 'Adobe Acrobat DC (Classic Track) <=2015.006.30394']
Show details on source website


{
  "bids": {
    "bid": {
      "bidNumber": "102995"
    }
  },
  "cves": {
    "cve": {
      "cveNumber": "CVE-2018-4913"
    }
  },
  "description": "Acrobat DC Continuous Track\u7b49\u90fd\u662f\u7f8e\u56fd\u5965\u591a\u6bd4\uff08Adobe\uff09\u516c\u53f8\u7684\u4ea7\u54c1\u3002Acrobat DC Continuous Track\u662f\u4e00\u6b3e\u684c\u9762\u7248PDF\u89e3\u51b3\u65b9\u6848\u7684\u8fde\u7eed\u66f4\u65b0\u7248\u672c\u3002Reader DC Continuous Track\u662f\u4e00\u6b3ePDF\u9605\u8bfb\u5de5\u5177\u7684\u8fde\u7eed\u66f4\u65b0\u7248\u672c\u3002XFA engine\u662f\u5176\u4e2d\u7684\u4e00\u4e2aXFA\u5f15\u64ce\u3002\r\n\r\n\u591a\u6b3eAdobe\u4ea7\u54c1\u4e2d\u7684XFA\u5f15\u64ce\u5b58\u5728\u5185\u5b58\u9519\u8bef\u5f15\u7528\u6f0f\u6d1e\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002",
  "discovererName": "Anonymously reported via Trend Micro\u0027s Zero Day Initiative",
  "formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://helpx.adobe.com/security/products/acrobat/apsb18-02.html",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2018-05055",
  "openTime": "2018-03-13",
  "patchDescription": "Acrobat DC Continuous Track\u7b49\u90fd\u662f\u7f8e\u56fd\u5965\u591a\u6bd4\uff08Adobe\uff09\u516c\u53f8\u7684\u4ea7\u54c1\u3002Acrobat DC Continuous Track\u662f\u4e00\u6b3e\u684c\u9762\u7248PDF\u89e3\u51b3\u65b9\u6848\u7684\u8fde\u7eed\u66f4\u65b0\u7248\u672c\u3002Reader DC Continuous Track\u662f\u4e00\u6b3ePDF\u9605\u8bfb\u5de5\u5177\u7684\u8fde\u7eed\u66f4\u65b0\u7248\u672c\u3002XFA engine\u662f\u5176\u4e2d\u7684\u4e00\u4e2aXFA\u5f15\u64ce\u3002\r\n\r\n\u591a\u6b3eAdobe\u4ea7\u54c1\u4e2d\u7684XFA\u5f15\u64ce\u5b58\u5728\u5185\u5b58\u9519\u8bef\u5f15\u7528\u6f0f\u6d1e\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "\u591a\u6b3eAdobe\u4ea7\u54c1XFA\u5f15\u64ce\u5185\u5b58\u9519\u8bef\u5f15\u7528\u6f0f\u6d1e\u7684\u8865\u4e01",
  "products": {
    "product": [
      "Adobe Acrobat DC (Continuous Track) \u003c=2018.009.20050",
      "Adobe Acrobat Reader DC (Continuous Track) \u003c=2018.009.20050",
      "Adobe Acrobat 2017 \u003c=2017.011.30070",
      "Adobe Acrobat Reader 2017 \u003c=2017.011.30070",
      "Adobe Acrobat Reader DC (Classic Track) \u003c=2015.006.30394",
      "Adobe Acrobat DC (Classic Track) \u003c=2015.006.30394"
    ]
  },
  "referenceLink": "https://helpx.adobe.com/security/products/acrobat/apsb18-02.html",
  "serverity": "\u9ad8",
  "submitTime": "2018-02-14",
  "title": "\u591a\u6b3eAdobe\u4ea7\u54c1XFA\u5f15\u64ce\u5185\u5b58\u9519\u8bef\u5f15\u7528\u6f0f\u6d1e"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…