Vulnerability Name: | CVE-2015-6685 (CCN-107124) |
Assigned: | 2015-10-13 |
Published: | 2015-10-13 |
Updated: | 2021-09-08 |
Summary: | Adobe Reader and Acrobat 10.x before 10.1.16 and 11.x before 11.0.13, Acrobat and Acrobat Reader DC Classic before 2015.006.30094, and Acrobat and Acrobat Reader DC Continuous before 2015.009.20069 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) by using the Format action for unspecified fields, a different vulnerability than CVE-2015-6686, CVE-2015-6693, CVE-2015-6694, CVE-2015-6695, and CVE-2015-7622.
|
CVSS v3 Severity: | 7.8 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 6.8 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Local Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): Required | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): High Integrity (I): High Availibility (A): High |
|
CVSS v2 Severity: | 6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Medium Authentication (Au): None | Impact Metrics: | Confidentiality (C): Partial Integrity (I): Partial Availibility (A): Partial | 6.8 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:S/C:C/I:C/A:C)Exploitability Metrics: | Access Vector (AV): Local Access Complexity (AC): Low Athentication (Au): Single_Instance
| Impact Metrics: | Confidentiality (C): Complete Integrity (I): Complete Availibility (A): Complete |
|
Vulnerability Type: | CWE-119
|
Vulnerability Consequences: | Gain Access |
References: | Source: MITRE Type: CNA CVE-2015-6685
Source: SECTRACK Type: Third Party Advisory, VDB Entry 1033796
Source: MISC Type: Third Party Advisory, VDB Entry http://www.zerodayinitiative.com/advisories/ZDI-15-467
Source: XF Type: UNKNOWN adobe-cve20156685-code-exec(107124)
Source: CCN Type: Adobe Security Bulletin APSB15-24 Security Updates Available for Adobe Acrobat and Reader
Source: CONFIRM Type: Patch, Vendor Advisory https://helpx.adobe.com/security/products/acrobat/apsb15-24.html
Source: CCN Type: ZDI-15-467 Adobe Acrobat Reader DC Fields Format Action Use-After-Free Remote Code Execution Vulnerability
|
Vulnerable Configuration: | Configuration 1: cpe:/a:adobe:acrobat:*:*:*:*:*:*:*:* (Version >= 10.0 and <= 10.1.15)OR cpe:/a:adobe:acrobat:*:*:*:*:*:*:*:* (Version >= 11.0.0 and <= 11.0.12)OR cpe:/a:adobe:acrobat_dc:*:*:*:*:classic:*:*:* (Version >= 15.006.30060 and < 15.006.30094)OR cpe:/a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:* (Version >= 15.008.20082 and < 15.009.20069)OR cpe:/a:adobe:acrobat_reader:*:*:*:*:*:*:*:* (Version >= 10.0 and <= 10.1.15)OR cpe:/a:adobe:acrobat_reader:*:*:*:*:*:*:*:* (Version >= 11.0.0 and <= 11.0.12)OR cpe:/a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:* (Version >= 15.006.30060 and < 15.006.30094)OR cpe:/a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:* (Version >= 15.008.20082 and < 15.009.20069)AND cpe:/o:apple:macos:-:*:*:*:*:*:*:*OR cpe:/o:microsoft:windows:-:*:*:*:*:*:*:* Configuration CCN 1: cpe:/a:adobe:acrobat_dc:2015.008.20082::~~continuous~~~:*:*:*:*:*OR cpe:/a:adobe:acrobat_reader_dc:2015.008.20082::~~continuous~~~:*:*:*:*:*OR cpe:/a:adobe:acrobat_reader_dc:2015.006.30060::~~classic~~~:*:*:*:*:*OR cpe:/a:adobe:acrobat_dc:2015.006.30060::~~classic~~~:*:*:*:*:* Denotes that component is vulnerable |
BACK |