Published on: 11 May 2016
Security updates are released for Adobe Acrobat/Reader to address multiple vulnerabilities caused by heap buffer overflow, integer overflow, memory corruption, memory leakage, use-after free errors, security restrictions bypass and a directory search path issue. To successfully exploit the vulnerabilities, a remote attacker could entice a targeted user to open a specially crafted PDF file.
Successful exploitation could lead to arbitrary code execution or potentially take control the affected system.
Upgrade Adobe Acrobat/Reader to the following versions to address the issues. The upgrade can be obtained by using the auto-update mechanism or by downloading at the following URLs:
https://helpx.adobe.com/security/products/acrobat/apsb16-14.html
https://helpx.adobe.com/security/products/flash-player/apsa16-02.html
https://www.hkcert.org/my_url/en/alert/16051116
https://www.us-cert.gov/ncas/current-activity/2016/05/10/Adobe-Releases-Security-Updates
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1037 (to CVE-2016-1088)
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1090
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1092 (to CVE-2016-1095)
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1112
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1116 (to CVE-2016-1130)
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4088 (to CVE-2016-4094)
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4096 (to CVE-2016-4107)