Vulnerability Details : CVE-2016-0935
Double free vulnerability in Adobe Reader and Acrobat before 11.0.14, Acrobat and Acrobat Reader DC Classic before 15.006.30119, and Acrobat and Acrobat Reader DC Continuous before 15.010.20056 on Windows and OS X allows attackers to execute arbitrary code via a crafted ExtGState dictionary.
Vulnerability category: Memory CorruptionExecute code
Exploit prediction scoring system (EPSS) score for CVE-2016-0935
Probability of exploitation activity in the next 30 days: 4.01%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 92 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2016-0935
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST |
8.8
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST |
References for CVE-2016-0935
-
http://zerodayinitiative.com/advisories/ZDI-16-017
ZDI-16-017 | Zero Day InitiativeThird Party Advisory;VDB Entry
-
https://helpx.adobe.com/security/products/acrobat/apsb16-02.html
Adobe Security BulletinPatch;Vendor Advisory
-
http://www.securitytracker.com/id/1034646
Adobe Acrobat/Reader Multiple Flaws Let Remote Users Execute Arbitrary Code and Bypass Security Restrictions - SecurityTrackerThird Party Advisory;VDB Entry
Products affected by CVE-2016-0935
- cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:11.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:11.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:11.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:11.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:11.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:11.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:11.0.8:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:11.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:11.0.10:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:11.0.9:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:11.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:11.0.12:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:11.0.11:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:11.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:11.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:11.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:11.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:11.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:11.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:11.0.8:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:11.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:11.0.9:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:11.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:11.0.10:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:11.0.11:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:11.0.12:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*
- cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*
- cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*
- cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*