CVE编号
CVE-2016-1037利用情况
暂无补丁情况
N/A披露时间
2016-05-11漏洞描述
Adobe Acrobat DC等都是美国奥多比(Adobe)公司的产品。Acrobat DC是一套桌面版PDF解决方案;Acrobat Reader DC是一套用于查看、打印和批注PDF的工具。Classic和Continuous是Acrobat DC和Acrobat Reader DC产品下载中心所提供的两种更新机制。多款Adobe产品中存在内存破坏漏洞。攻击者可利用该漏洞执行任意代码,控制受影响系统。
解决建议
用户可参考如下厂商提供的安全公告获取补丁以修复该漏洞:https://helpx.adobe.com/security/products/acrobat/apsb16-14.html
参考链接 |
|
---|---|
http://www.securitytracker.com/id/1035828 | |
https://helpx.adobe.com/security/products/acrobat/apsb16-14.html |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | adobe | acrobat | * |
Up to (including) 11.0.15 |
|||||
运行在以下环境 | |||||||||
应用 | adobe | acrobat_dc | * |
Up to (including) 15.006.30121 |
|||||
运行在以下环境 | |||||||||
应用 | adobe | acrobat_dc | * |
Up to (including) 15.010.20060 |
|||||
运行在以下环境 | |||||||||
应用 | adobe | acrobat_reader_dc | * |
Up to (including) 15.006.30121 |
|||||
运行在以下环境 | |||||||||
应用 | adobe | acrobat_reader_dc | * |
Up to (including) 15.010.20060 |
|||||
运行在以下环境 | |||||||||
应用 | adobe | reader | * |
Up to (including) 11.0.15 |
|||||
运行在以下环境 | |||||||||
系统 | apple | mac_os_x | * | - | |||||
运行在以下环境 | |||||||||
系统 | debian | DPKG | * |
Up to (excluding) 0.16.6-1.1 |
|||||
运行在以下环境 | |||||||||
系统 | debian | DPKG | * |
Up to (excluding) 2.6.1+git20161123-1 |
|||||
运行在以下环境 | |||||||||
系统 | debian | DPKG | * |
Up to (excluding) 20140328-2 |
|||||
运行在以下环境 | |||||||||
系统 | debian | DPKG | * |
Up to (excluding) 3.07.01-1 |
|||||
运行在以下环境 | |||||||||
系统 | debian | DPKG | * |
Up to (excluding) 4.0.7-7 |
|||||
运行在以下环境 | |||||||||
系统 | debian_7 | yodl | * |
Up to (excluding) 0.15.1-4.1+deb7u3 |
|||||
运行在以下环境 | |||||||||
系统 | debian_8 | yodl | * |
Up to (excluding) 0.16-1+deb8u2 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_24 | yodl | * |
Up to (excluding) 0.16.8-1.fc24 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_25 | yodl | * |
Up to (excluding) 0.16.8-1.fc25 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_26 | yodl | * |
Up to (excluding) 0.16.8-1.fc26 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_EPEL_7 | yodl | * |
Up to (excluding) 0.16.8-1.el7 |
|||||
运行在以下环境 | |||||||||
系统 | microsoft | windows | * | - | |||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_42.2 | yodl | * |
Up to (excluding) 3.05.01-3.3.1 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_42.3 | yodl | * |
Up to (excluding) 4.0.8-21.1 |
|||||
运行在以下环境 | |||||||||
系统 | sles_12 | libtiff5 | * |
Up to (excluding) 4.0.8-44.3 |
|||||
运行在以下环境 | |||||||||
系统 | sles_12_SP2 | yodl | * |
Up to (excluding) 4.0.8-44.3.1 |
|||||
运行在以下环境 | |||||||||
系统 | sles_12_SP3 | yodl | * |
Up to (excluding) 4.0.8-44.3.1 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_14.04_lts | tiff | * |
Up to (excluding) 4.0.3-7ubuntu0.8 |
|||||
- 攻击路径 网络
- 攻击复杂度 低
- 权限要求 无
- 影响范围 未更改
- 用户交互 无
- 可用性 高
- 保密性 高
- 完整性 高
还没有评论,来说两句吧...