Attacker Value
Unknown
(0 users assessed)
Exploitability
Unknown
(0 users assessed)
User Interaction
Required
Privileges Required
None
Attack Vector
Network
0

CVE-2016-0932

Disclosure Date: January 14, 2016
Add MITRE ATT&CK tactics and techniques that apply to this CVE.

Description

Use-after-free vulnerability in the Doc object implementation in Adobe Reader and Acrobat before 11.0.14, Acrobat and Acrobat Reader DC Classic before 15.006.30119, and Acrobat and Acrobat Reader DC Continuous before 15.010.20056 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-0934, CVE-2016-0937, CVE-2016-0940, and CVE-2016-0941.

Add Assessment

No one has assessed this topic. Be the first to add your voice to the community.

CVSS V3 Severity and Metrics
Base Score:
8.8 High
Impact Score:
5.9
Exploitability Score:
2.8
Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack Vector (AV):
Network
Attack Complexity (AC):
Low
Privileges Required (PR):
None
User Interaction (UI):
Required
Scope (S):
Unchanged
Confidentiality (C):
High
Integrity (I):
High
Availability (A):
High

General Information

Vendors

  • adobe

Products

  • acrobat,
  • acrobat 11.0.0,
  • acrobat 11.0.1,
  • acrobat 11.0.10,
  • acrobat 11.0.11,
  • acrobat 11.0.12,
  • acrobat 11.0.2,
  • acrobat 11.0.3,
  • acrobat 11.0.4,
  • acrobat 11.0.5,
  • acrobat 11.0.6,
  • acrobat 11.0.7,
  • acrobat 11.0.8,
  • acrobat 11.0.9,
  • acrobat dc,
  • acrobat reader,
  • acrobat reader 11.0.0,
  • acrobat reader 11.0.1,
  • acrobat reader 11.0.10,
  • acrobat reader 11.0.11,
  • acrobat reader 11.0.12,
  • acrobat reader 11.0.2,
  • acrobat reader 11.0.3,
  • acrobat reader 11.0.4,
  • acrobat reader 11.0.5,
  • acrobat reader 11.0.6,
  • acrobat reader 11.0.7,
  • acrobat reader 11.0.8,
  • acrobat reader 11.0.9,
  • acrobat reader dc

Additional Info

Technical Analysis