CERTFR-2019-AVI-218
Vulnerability from certfr_avis - Published: 2019-05-15 - Updated: 2019-05-15
De multiples vulnérabilités ont été découvertes dans Adobe Acrobat et Reader. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneImpacted products
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Adobe | Acrobat | Adobe Acrobat Reader DC versions antérieures à 2019.012.20034 sur Windows et macOS | ||
| Adobe | Acrobat | Adobe Acrobat 2017 versions antérieures à 2017.011.30142 sur Windows et macOS | ||
| Adobe | Acrobat | Adobe Acrobat DC Classic 2015 versions antérieures à 2015.006.30497 sur Windows et macOS | ||
| Adobe | Acrobat | Adobe Acrobat DC versions antérieures à 2019.012.20034 sur Windows et macOS | ||
| Adobe | Acrobat | Adobe Acrobat Reader DC 2017 versions antérieures à 2017.011.30142 sur Windows et macOS | ||
| Adobe | Acrobat | Adobe Acrobat Reader DC Classic 2015 versions antérieures à 2015.006.30497 sur Windows et macOS |
References
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Adobe Acrobat Reader DC versions ant\u00e9rieures \u00e0 2019.012.20034 sur Windows et macOS",
"product": {
"name": "Acrobat",
"vendor": {
"name": "Adobe",
"scada": false
}
}
},
{
"description": "Adobe Acrobat 2017 versions ant\u00e9rieures \u00e0 2017.011.30142 sur Windows et macOS",
"product": {
"name": "Acrobat",
"vendor": {
"name": "Adobe",
"scada": false
}
}
},
{
"description": "Adobe Acrobat DC Classic 2015 versions ant\u00e9rieures \u00e0 2015.006.30497 sur Windows et macOS",
"product": {
"name": "Acrobat",
"vendor": {
"name": "Adobe",
"scada": false
}
}
},
{
"description": "Adobe Acrobat DC versions ant\u00e9rieures \u00e0 2019.012.20034 sur Windows et macOS",
"product": {
"name": "Acrobat",
"vendor": {
"name": "Adobe",
"scada": false
}
}
},
{
"description": "Adobe Acrobat Reader DC 2017 versions ant\u00e9rieures \u00e0 2017.011.30142 sur Windows et macOS",
"product": {
"name": "Acrobat",
"vendor": {
"name": "Adobe",
"scada": false
}
}
},
{
"description": "Adobe Acrobat Reader DC Classic 2015 versions ant\u00e9rieures \u00e0 2015.006.30497 sur Windows et macOS",
"product": {
"name": "Acrobat",
"vendor": {
"name": "Adobe",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-7800",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7800"
},
{
"name": "CVE-2019-7820",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7820"
},
{
"name": "CVE-2019-7786",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7786"
},
{
"name": "CVE-2019-7834",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7834"
},
{
"name": "CVE-2019-7814",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7814"
},
{
"name": "CVE-2019-7823",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7823"
},
{
"name": "CVE-2019-7841",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7841"
},
{
"name": "CVE-2019-7769",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7769"
},
{
"name": "CVE-2019-7806",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7806"
},
{
"name": "CVE-2019-7808",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7808"
},
{
"name": "CVE-2019-7827",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7827"
},
{
"name": "CVE-2019-7817",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7817"
},
{
"name": "CVE-2019-7818",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7818"
},
{
"name": "CVE-2019-7764",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7764"
},
{
"name": "CVE-2019-7830",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7830"
},
{
"name": "CVE-2019-7758",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7758"
},
{
"name": "CVE-2019-7790",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7790"
},
{
"name": "CVE-2019-7821",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7821"
},
{
"name": "CVE-2019-7798",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7798"
},
{
"name": "CVE-2019-7759",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7759"
},
{
"name": "CVE-2019-7795",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7795"
},
{
"name": "CVE-2019-7797",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7797"
},
{
"name": "CVE-2019-7775",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7775"
},
{
"name": "CVE-2019-7807",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7807"
},
{
"name": "CVE-2019-7783",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7783"
},
{
"name": "CVE-2019-7826",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7826"
},
{
"name": "CVE-2019-7799",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7799"
},
{
"name": "CVE-2019-7794",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7794"
},
{
"name": "CVE-2019-7760",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7760"
},
{
"name": "CVE-2019-7788",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7788"
},
{
"name": "CVE-2019-7785",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7785"
},
{
"name": "CVE-2019-7145",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7145"
},
{
"name": "CVE-2019-7142",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7142"
},
{
"name": "CVE-2019-7802",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7802"
},
{
"name": "CVE-2019-7140",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7140"
},
{
"name": "CVE-2019-7776",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7776"
},
{
"name": "CVE-2019-7805",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7805"
},
{
"name": "CVE-2019-7819",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7819"
},
{
"name": "CVE-2019-7829",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7829"
},
{
"name": "CVE-2019-7784",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7784"
},
{
"name": "CVE-2019-7780",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7780"
},
{
"name": "CVE-2019-7787",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7787"
},
{
"name": "CVE-2019-7778",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7778"
},
{
"name": "CVE-2019-7811",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7811"
},
{
"name": "CVE-2019-7781",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7781"
},
{
"name": "CVE-2019-7774",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7774"
},
{
"name": "CVE-2019-7812",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7812"
},
{
"name": "CVE-2019-7809",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7809"
},
{
"name": "CVE-2019-7804",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7804"
},
{
"name": "CVE-2019-7144",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7144"
},
{
"name": "CVE-2019-7770",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7770"
},
{
"name": "CVE-2019-7831",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7831"
},
{
"name": "CVE-2019-7796",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7796"
},
{
"name": "CVE-2019-7771",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7771"
},
{
"name": "CVE-2019-7810",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7810"
},
{
"name": "CVE-2019-7773",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7773"
},
{
"name": "CVE-2019-7768",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7768"
},
{
"name": "CVE-2019-7833",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7833"
},
{
"name": "CVE-2019-7813",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7813"
},
{
"name": "CVE-2019-7779",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7779"
},
{
"name": "CVE-2019-7828",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7828"
},
{
"name": "CVE-2019-7822",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7822"
},
{
"name": "CVE-2019-7791",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7791"
},
{
"name": "CVE-2019-7763",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7763"
},
{
"name": "CVE-2019-7761",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7761"
},
{
"name": "CVE-2019-7762",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7762"
},
{
"name": "CVE-2019-7777",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7777"
},
{
"name": "CVE-2019-7803",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7803"
},
{
"name": "CVE-2019-7772",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7772"
},
{
"name": "CVE-2019-7143",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7143"
},
{
"name": "CVE-2019-7789",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7789"
},
{
"name": "CVE-2019-7832",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7832"
},
{
"name": "CVE-2019-7801",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7801"
},
{
"name": "CVE-2019-7765",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7765"
},
{
"name": "CVE-2019-7824",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7824"
},
{
"name": "CVE-2019-7835",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7835"
},
{
"name": "CVE-2019-7836",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7836"
},
{
"name": "CVE-2019-7793",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7793"
},
{
"name": "CVE-2019-7767",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7767"
},
{
"name": "CVE-2019-7792",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7792"
},
{
"name": "CVE-2019-7141",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7141"
},
{
"name": "CVE-2019-7782",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7782"
},
{
"name": "CVE-2019-7766",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7766"
},
{
"name": "CVE-2019-7825",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7825"
}
],
"initial_release_date": "2019-05-15T00:00:00",
"last_revision_date": "2019-05-15T00:00:00",
"links": [],
"reference": "CERTFR-2019-AVI-218",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-05-15T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Adobe Acrobat et\nReader. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de\ncode arbitraire \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des\ndonn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Adobe Acrobat et Reader",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Adobe apsb19-18 du 14 mai 2019",
"url": "https://helpx.adobe.com/security/products/acrobat/apsb19-18.html"
}
]
}
Loading…
Loading…
Experimental. This forecast is provided for visualization only and may change without notice. Do not use it for operational decisions.
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…