CVE编号
CVE-2016-1071利用情况
暂无补丁情况
N/A披露时间
2016-05-11漏洞描述
Adobe Acrobat Reader DC是美国奥多比(Adobe)公司的一套用于查看、打印和批注PDF的工具。Adobe Reader DC U3D存在越界读信息泄露漏洞,允许攻击者利用该漏洞访问恶意网页或打开一个恶意文件获取敏感信息,或执行任意代码,控制受影响系统。
解决建议
目前厂商已经发布了升级补丁以修复此安全问题,补丁获取链接:https://helpx.adobe.com/security/products/acrobat/apsb16-14.html
参考链接 |
|
---|---|
http://www.securitytracker.com/id/1035828 | |
http://www.zerodayinitiative.com/advisories/ZDI-16-319 | |
https://helpx.adobe.com/security/products/acrobat/apsb16-14.html |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | adobe | acrobat | * |
Up to (including) 11.0.15 |
|||||
运行在以下环境 | |||||||||
应用 | adobe | acrobat_dc | * |
Up to (including) 15.006.30121 |
|||||
运行在以下环境 | |||||||||
应用 | adobe | acrobat_dc | * |
Up to (including) 15.010.20060 |
|||||
运行在以下环境 | |||||||||
应用 | adobe | acrobat_reader_dc | * |
Up to (including) 15.006.30121 |
|||||
运行在以下环境 | |||||||||
应用 | adobe | acrobat_reader_dc | * |
Up to (including) 15.010.20060 |
|||||
运行在以下环境 | |||||||||
应用 | adobe | reader | * |
Up to (including) 11.0.15 |
|||||
运行在以下环境 | |||||||||
系统 | alibaba_cloud_linux_2.1903 | zsh | * |
Up to (excluding) 2.7.1-11.1.al7 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_3.4 | zsh | * |
Up to (excluding) 2.7.5-r3 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_3.5 | zsh | * |
Up to (excluding) 2.7.5-r3 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_3.6 | zsh | * |
Up to (excluding) 2.7.5-r3 |
|||||
运行在以下环境 | |||||||||
系统 | amazon linux_2 | zsh | * |
Up to (excluding) 2.7.1-12.amzn2 |
|||||
运行在以下环境 | |||||||||
系统 | amazon linux_AMI | zsh | * |
Up to (excluding) 2.7.1-12.14.amzn1 |
|||||
运行在以下环境 | |||||||||
系统 | amazon_2 | zsh | * |
Up to (excluding) 2.7.1-12.amzn2 |
|||||
运行在以下环境 | |||||||||
系统 | amazon_AMI | zsh | * |
Up to (excluding) 2.7.1-12.14.amzn1 |
|||||
运行在以下环境 | |||||||||
系统 | apple | mac_os_x | * | - | |||||
运行在以下环境 | |||||||||
系统 | debian_7 | zsh | * |
Up to (excluding) 2.6-2+deb7u2 |
|||||
运行在以下环境 | |||||||||
系统 | debian_8 | zsh | * |
Up to (excluding) 2.6-6+deb8u1 |
|||||
运行在以下环境 | |||||||||
系统 | debian_9 | zsh | * |
Up to (excluding) 2.7.5-1+deb9u2 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_26 | zsh | * |
Up to (excluding) 2.7.6-3.fc26 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_27 | zsh | * |
Up to (excluding) 2.7.6-3.fc27 |
|||||
运行在以下环境 | |||||||||
系统 | microsoft | windows | * | - | |||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_42.3 | zsh | * |
Up to (excluding) 2.7.5-9.3.1 |
|||||
运行在以下环境 | |||||||||
系统 | oracle linux_7 | zsh | * |
Up to (excluding) 2.7.1-11.el7 |
|||||
运行在以下环境 | |||||||||
系统 | oracle_7 | zsh | * |
Up to (excluding) 2.7.1-11.el7 |
|||||
运行在以下环境 | |||||||||
系统 | redhat_7 | patch | * |
Up to (excluding) 0:2.7.1-11.el7 |
|||||
运行在以下环境 | |||||||||
系统 | sles_11_SP4 | zsh | * |
Up to (excluding) 2.5.9-252.22.7.1 |
|||||
运行在以下环境 | |||||||||
系统 | sles_12 | apache2-mod_php5 | * |
Up to (excluding) 5.5.14-109.20 |
|||||
运行在以下环境 | |||||||||
系统 | sles_12 | patch | * |
Up to (excluding) 2.7.5-8.5 |
|||||
运行在以下环境 | |||||||||
系统 | sles_12 | zsh | * |
Up to (excluding) 5.0.5-6.7 |
|||||
运行在以下环境 | |||||||||
系统 | sles_12_SP3 | zsh | * |
Up to (excluding) 5.0.5-6.7.2 |
|||||
运行在以下环境 | |||||||||
系统 | suse_11_SP4 | zsh | * |
Up to (excluding) 2.5.9-252.22.7.1 |
|||||
运行在以下环境 | |||||||||
系统 | suse_12_SP3 | zsh | * |
Up to (excluding) 5.0.5-6.7.2 |
|||||
- 攻击路径 网络
- 攻击复杂度 低
- 权限要求 无
- 影响范围 未更改
- 用户交互 无
- 可用性 高
- 保密性 高
- 完整性 高
还没有评论,来说两句吧...