CVE编号
CVE-2016-1009利用情况
暂无补丁情况
N/A披露时间
2016-03-10漏洞描述
Adobe Acrobat DC等都是美国奥多比(Adobe)公司的产品。Acrobat DC是一套桌面版PDF解决方案;Acrobat Reader DC是一套用于查看、打印和批注PDF的工具。Classic和Continuous是Acrobat DC和Acrobat Reader DC产品下载中心所提供的两种更新机制。多款Adobe产品存在安全漏洞。由于程序未能正确初始化手势的属性。远程攻击者利用该漏洞执行任意代码。
解决建议
目前厂商已经发布了升级补丁以修复此安全问题,补丁获取链接:https://helpx.adobe.com/security/products/acrobat/apsb16-09.html
参考链接 |
|
---|---|
http://www.securityfocus.com/bid/84215 | |
http://www.securitytracker.com/id/1035199 | |
http://www.zerodayinitiative.com/advisories/ZDI-16-191 | |
https://helpx.adobe.com/security/products/acrobat/apsb16-09.html |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | adobe | acrobat | * |
Up to (including) 11.0.14 |
|||||
运行在以下环境 | |||||||||
应用 | adobe | acrobat_dc | * |
Up to (including) 15.006.30119 |
|||||
运行在以下环境 | |||||||||
应用 | adobe | acrobat_dc | * |
Up to (including) 15.010.20059 |
|||||
运行在以下环境 | |||||||||
应用 | adobe | acrobat_reader | * |
Up to (including) 11.0.14 |
|||||
运行在以下环境 | |||||||||
应用 | adobe | acrobat_reader_dc | * |
Up to (including) 15.006.30119 |
|||||
运行在以下环境 | |||||||||
应用 | adobe | acrobat_reader_dc | * |
Up to (including) 15.010.20059 |
|||||
运行在以下环境 | |||||||||
系统 | debian_7 | tiff | * |
Up to (excluding) 4.0.2-6+deb7u14 |
|||||
运行在以下环境 | |||||||||
系统 | debian_8 | tiff | * |
Up to (excluding) 4.0.3-12.3+deb8u10 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_27 | tiff | * |
Up to (excluding) 0.21.9-8.fc27 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_28 | tiff | * |
Up to (excluding) 0.21.9-8.fc28 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_EPEL_6 | tiff | * |
Up to (excluding) 0.21.9-8.el6 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_EPEL_7 | tiff | * |
Up to (excluding) 0.21.9-8.el7 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.0 | tiff | * |
Up to (excluding) 4.0.9-lp150.4.12.1 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_42.2 | tiff | * |
Up to (excluding) 4.0.9-24.1 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_42.3 | tiff | * |
Up to (excluding) 4.0.9-24.1 |
|||||
运行在以下环境 | |||||||||
系统 | suse_11_SP4 | tiff | * |
Up to (excluding) 3.8.2-141.169.9.1 |
|||||
运行在以下环境 | |||||||||
系统 | suse_12_SP2 | tiff | * |
Up to (excluding) 4.0.9-44.7.1 |
|||||
运行在以下环境 | |||||||||
系统 | suse_12_SP3 | tiff | * |
Up to (excluding) 4.0.9-44.30.1 |
|||||
运行在以下环境 | |||||||||
系统 | suse_12_SP4 | tiff | * |
Up to (excluding) 4.0.9-44.30.1 |
|||||
- 攻击路径 网络
- 攻击复杂度 低
- 权限要求 无
- 影响范围 未更改
- 用户交互 无
- 可用性 高
- 保密性 高
- 完整性 高
还没有评论,来说两句吧...