ID

VAR-201605-0111


CVE

CVE-2016-4091


TITLE

Windows and Mac OS X Run on Adobe Reader and Acrobat Heap-based buffer overflow vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2016-002677

DESCRIPTION

Heap-based buffer overflow in Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4092. This vulnerability CVE-2016-4092 Is a different vulnerability.An attacker could execute arbitrary code. Failed attempts will likely cause a denial-of-service condition. Adobe Acrobat DC, etc. are all products of Adobe (Adobe) in the United States. Acrobat DC is a desktop PDF solution; Acrobat Reader DC is a set of tools for viewing, printing and annotating PDF

Trust: 1.98

sources: NVD: CVE-2016-4091 // JVNDB: JVNDB-2016-002677 // BID: 90508 // VULHUB: VHN-92910

AFFECTED PRODUCTS

vendor:adobemodel:acrobat dcscope:lteversion:15.006.30121

Trust: 1.0

vendor:adobemodel:acrobat dcscope:lteversion:15.010.20060

Trust: 1.0

vendor:adobemodel:acrobat reader dcscope:lteversion:15.006.30121

Trust: 1.0

vendor:adobemodel:readerscope:lteversion:11.0.15

Trust: 1.0

vendor:adobemodel:acrobat reader dcscope:lteversion:15.010.20060

Trust: 1.0

vendor:adobemodel:acrobatscope:lteversion:11.0.15

Trust: 1.0

vendor:adobemodel:acrobatscope:ltversion:xi desktop 11.0.16 (windows/macintosh)

Trust: 0.8

vendor:adobemodel:acrobat dcscope:ltversion:classic 15.006.30172 (windows/macintosh)

Trust: 0.8

vendor:adobemodel:acrobat dcscope:ltversion:continuous track 15.016.20039 (windows/macintosh)

Trust: 0.8

vendor:adobemodel:acrobat reader dcscope:ltversion:classic 15.006.30172 (windows/macintosh)

Trust: 0.8

vendor:adobemodel:acrobat reader dcscope:ltversion:continuous track 15.016.20039 (windows/macintosh)

Trust: 0.8

vendor:adobemodel:readerscope:ltversion:xi desktop 11.0.16 (windows/macintosh)

Trust: 0.8

vendor:microsoftmodel:windowsscope: - version: -

Trust: 0.6

sources: JVNDB: JVNDB-2016-002677 // CNNVD: CNNVD-201605-312 // NVD: CVE-2016-4091

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-4091
value: CRITICAL

Trust: 1.0

NVD: CVE-2016-4091
value: CRITICAL

Trust: 0.8

CNNVD: CNNVD-201605-312
value: CRITICAL

Trust: 0.6

VULHUB: VHN-92910
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2016-4091
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-92910
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2016-4091
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-92910 // JVNDB: JVNDB-2016-002677 // CNNVD: CNNVD-201605-312 // NVD: CVE-2016-4091

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-92910 // JVNDB: JVNDB-2016-002677 // NVD: CVE-2016-4091

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201605-312

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-201605-312

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-002677

PATCH

title:APSB16-14url:https://helpx.adobe.com/security/products/acrobat/apsb16-14.html

Trust: 0.8

title:APSB16-14url:https://helpx.adobe.com/jp/security/products/reader/apsb16-14.html

Trust: 0.8

title:アドビ システムズ社 Adobe Reader の脆弱性に関するお知らせurl:http://www.fmworld.net/biz/common/adobe/20160512.html

Trust: 0.8

title:Multiple Adobe Product-based patch-based buffer overflow vulnerability fixesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=61630

Trust: 0.6

sources: JVNDB: JVNDB-2016-002677 // CNNVD: CNNVD-201605-312

EXTERNAL IDS

db:NVDid:CVE-2016-4091

Trust: 2.8

db:BIDid:90508

Trust: 1.4

db:SECTRACKid:1035828

Trust: 1.1

db:JVNDBid:JVNDB-2016-002677

Trust: 0.8

db:CNNVDid:CNNVD-201605-312

Trust: 0.7

db:AUSCERTid:ESB-2016.1146

Trust: 0.6

db:VULHUBid:VHN-92910

Trust: 0.1

sources: VULHUB: VHN-92910 // BID: 90508 // JVNDB: JVNDB-2016-002677 // CNNVD: CNNVD-201605-312 // NVD: CVE-2016-4091

REFERENCES

url:https://helpx.adobe.com/security/products/acrobat/apsb16-14.html

Trust: 1.7

url:http://www.securityfocus.com/bid/90508

Trust: 1.1

url:http://www.securitytracker.com/id/1035828

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-4091

Trust: 0.8

url:https://www.ipa.go.jp/security/ciadr/vul/20160511-adobereader.html

Trust: 0.8

url:https://www.jpcert.or.jp/at/2016/at160023.html

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-4091

Trust: 0.8

url:http://www.npa.go.jp/cyberpolice/topics/?seq=18377

Trust: 0.8

url:https://www.auscert.org.au/render.html?it=34330

Trust: 0.6

url:http://www.adobe.com/products/flash/

Trust: 0.3

url:http://www.adobe.com

Trust: 0.3

sources: VULHUB: VHN-92910 // BID: 90508 // JVNDB: JVNDB-2016-002677 // CNNVD: CNNVD-201605-312 // NVD: CVE-2016-4091

CREDITS

Ke Liu of Tencent's Xuanwu LAB

Trust: 0.6

sources: CNNVD: CNNVD-201605-312

SOURCES

db:VULHUBid:VHN-92910
db:BIDid:90508
db:JVNDBid:JVNDB-2016-002677
db:CNNVDid:CNNVD-201605-312
db:NVDid:CVE-2016-4091

LAST UPDATE DATE

2025-04-13T23:03:03.938000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-92910date:2016-12-02T00:00:00
db:BIDid:90508date:2016-05-10T00:00:00
db:JVNDBid:JVNDB-2016-002677date:2016-05-17T00:00:00
db:CNNVDid:CNNVD-201605-312date:2016-05-11T00:00:00
db:NVDid:CVE-2016-4091date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:VULHUBid:VHN-92910date:2016-05-11T00:00:00
db:BIDid:90508date:2016-05-10T00:00:00
db:JVNDBid:JVNDB-2016-002677date:2016-05-17T00:00:00
db:CNNVDid:CNNVD-201605-312date:2016-05-11T00:00:00
db:NVDid:CVE-2016-4091date:2016-05-11T11:00:42.997