CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
7.9 | $0-$5k | 0.00 |
A vulnerability classified as critical was found in Adobe Acrobat Reader up to 11.0.15/15.006 (Document Reader Software). This vulnerability affects an unknown part. The manipulation with an unknown input leads to a memory corruption vulnerability. The CWE definition for the vulnerability is CWE-119. The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer. As an impact it is known to affect confidentiality, integrity, and availability.
The weakness was disclosed 05/05/2016 as APSB16-14 as confirmed security bulletin (Website). The advisory is available at helpx.adobe.com. This vulnerability was named CVE-2016-1063 since 12/22/2015. The attack can be initiated remotely. No form of authentication is required for a successful exploitation. Successful exploitation requires user interaction by the victim. The technical details are unknown and an exploit is not available. The structure of the vulnerability defines a possible price range of USD $0-$5k at the moment (estimation calculated on 08/18/2022).
The vulnerability scanner Nessus provides a plugin with the ID 91096 (Adobe Acrobat < 11.0.16 / 15.006.30172 / 15.016.20039 Multiple Vulnerabilities (APSB16-14)), which helps to determine the existence of the flaw in a target environment. It is assigned to the family Windows.
Upgrading to version 11.0.16 or 15.006.30172 eliminates this vulnerability. A possible mitigation has been published immediately after the disclosure of the vulnerability.
The vulnerability is also documented in the vulnerability database at Tenable (91096). The entries 87176, 87177, 87178 and 87179 are pretty similar.
Product
Type
Vendor
Name
License
- free
CPE 2.3
CPE 2.2
CVSSv3
VulDB Meta Base Score: 8.0VulDB Meta Temp Score: 7.9
VulDB Base Score: 6.3
VulDB Temp Score: 6.0
VulDB Vector: 🔍
VulDB Reliability: 🔍
NVD Base Score: 9.8
NVD Vector: 🔍
CVSSv2
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Memory corruptionCWE: CWE-119
ATT&CK: Unknown
Local: No
Remote: Yes
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Nessus ID: 91096
Nessus Name: Adobe Acrobat < 11.0.16 / 15.006.30172 / 15.016.20039 Multiple Vulnerabilities (APSB16-14)
Nessus File: 🔍
Nessus Family: 🔍
OpenVAS ID: 861326
OpenVAS Name: Adobe Reader Security Updates(apsb16-14)-Windows
OpenVAS File: 🔍
OpenVAS Family: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
Reaction Time: 🔍
0-Day Time: 🔍
Exposure Time: 🔍
Upgrade: Acrobat Reader 11.0.16/15.006.30172
Timeline
12/22/2015 🔍05/05/2016 🔍
05/05/2016 🔍
05/11/2016 🔍
05/12/2016 🔍
08/18/2022 🔍
Sources
Vendor: adobe.comAdvisory: APSB16-14
Status: Confirmed
Confirmation: 🔍
CVE: CVE-2016-1063 (🔍)
SecurityTracker: 1035828
See also: 🔍
Entry
Created: 05/12/2016 11:00 AMUpdated: 08/18/2022 02:54 PM
Changes: 05/12/2016 11:00 AM (56), 04/07/2017 10:48 AM (16), 08/18/2022 02:54 PM (3)
Complete: 🔍
No comments yet. Languages: en.
Please log in to comment.