ID

VAR-201601-0593


CVE

CVE-2016-0947


TITLE

Windows and Mac OS X Run on Adobe Reader and Acrobat Used in Adobe Download Manager Vulnerable to gaining privileges

Trust: 0.8

sources: JVNDB: JVNDB-2016-001049

DESCRIPTION

Untrusted search path vulnerability in Adobe Download Manager, as used in Adobe Reader and Acrobat before 11.0.14, Acrobat and Acrobat Reader DC Classic before 15.006.30119, and Acrobat and Acrobat Reader DC Continuous before 15.010.20056 on Windows and OS X, allows local users to gain privileges via a crafted resource in an unspecified directory. Supplementary information : CWE Vulnerability types by CWE-426: Untrusted Search Path ( Unreliable search path ) Has been identified. http://cwe.mitre.org/data/definitions/426.htmlA local user could gain privileges through a crafted resource in an unspecified directory. Attackers can exploit this issue to execute arbitrary code in the context of the user running the affected application. Adobe Reader, etc. are all products of Adobe (Adobe) in the United States. Adobe Reader is a free PDF file reader; Acrobat is a PDF file editing and conversion tool; Acrobat Reader DC is a set of tools for viewing, printing and annotating PDF. Adobe Download Manager is a set of tools that supports automatic downloading of installation programs from Adobe servers. This tool can help control the download process of Adobe Reader, Adobe Acrobat, trial software and other Adobe files, such as downloading without restarting from the beginning if the download is interrupted

Trust: 1.98

sources: NVD: CVE-2016-0947 // JVNDB: JVNDB-2016-001049 // BID: 80362 // VULHUB: VHN-88457

AFFECTED PRODUCTS

vendor:adobemodel:acrobat readerscope:eqversion:11.0.2

Trust: 1.9

vendor:adobemodel:acrobat readerscope:eqversion:11.0.0

Trust: 1.9

vendor:adobemodel:acrobat readerscope:eqversion:11.0.7

Trust: 1.9

vendor:adobemodel:acrobat readerscope:eqversion:11.0.6

Trust: 1.9

vendor:adobemodel:acrobat readerscope:eqversion:11.0.4

Trust: 1.9

vendor:adobemodel:acrobat readerscope:eqversion:11.0.1

Trust: 1.9

vendor:adobemodel:acrobat readerscope:eqversion:11.0.5

Trust: 1.6

vendor:adobemodel:acrobat readerscope:eqversion:11.0.12

Trust: 1.6

vendor:adobemodel:acrobatscope:eqversion:11.0.6

Trust: 1.3

vendor:adobemodel:acrobat readerscope:eqversion:11.0.9

Trust: 1.3

vendor:adobemodel:acrobatscope:eqversion:11.0.3

Trust: 1.3

vendor:adobemodel:acrobatscope:eqversion:11.0.4

Trust: 1.3

vendor:adobemodel:acrobatscope:eqversion:11.0.10

Trust: 1.3

vendor:adobemodel:acrobat readerscope:eqversion:11.0.3

Trust: 1.3

vendor:adobemodel:acrobatscope:eqversion:11.0.1

Trust: 1.3

vendor:adobemodel:acrobatscope:eqversion:11.0.2

Trust: 1.3

vendor:adobemodel:acrobatscope:eqversion:11.0.12

Trust: 1.3

vendor:adobemodel:acrobatscope:eqversion:11.0.9

Trust: 1.3

vendor:adobemodel:acrobatscope:eqversion:11.0.11

Trust: 1.3

vendor:adobemodel:acrobatscope:eqversion:11.0.7

Trust: 1.3

vendor:adobemodel:acrobat readerscope:eqversion:11.0.11

Trust: 1.0

vendor:adobemodel:acrobat dcscope:lteversion:15.006.30097

Trust: 1.0

vendor:adobemodel:acrobatscope:lteversion:11.0.13

Trust: 1.0

vendor:adobemodel:acrobat reader dcscope:lteversion:15.006.30097

Trust: 1.0

vendor:adobemodel:acrobat dcscope:lteversion:15.009.20077

Trust: 1.0

vendor:adobemodel:acrobat reader dcscope:lteversion:15.009.20077

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:11.0.0

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:11.0.5

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:11.0.10

Trust: 1.0

vendor:adobemodel:acrobat readerscope:lteversion:11.0.13

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:11.0.8

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:11.0.8

Trust: 1.0

vendor:adobemodel:acrobatscope:ltversion:xi desktop 11.0.14 (windows/macintosh)

Trust: 0.8

vendor:adobemodel:acrobat dcscope:ltversion:classical 15.006.30119 (windows/macintosh)

Trust: 0.8

vendor:adobemodel:acrobat dcscope:ltversion:continuous track 15.010.20056 (windows/macintosh)

Trust: 0.8

vendor:adobemodel:acrobat reader dcscope:ltversion:classical 15.006.30119 (windows/macintosh)

Trust: 0.8

vendor:adobemodel:acrobat reader dcscope:ltversion:continuous track 15.010.20056 (windows/macintosh)

Trust: 0.8

vendor:adobemodel:readerscope:ltversion:xi desktop 11.0.14 (windows/macintosh)

Trust: 0.8

vendor:adobemodel:acrobat reader dcscope:eqversion:15.006.30097

Trust: 0.6

vendor:adobemodel:acrobat reader dcscope:eqversion:15.009.20077

Trust: 0.6

vendor:adobemodel:acrobatscope:eqversion:11.0.13

Trust: 0.3

vendor:adobemodel:acrobatscope:eqversion:11.0.09

Trust: 0.3

vendor:adobemodel:acrobat dcscope:eqversion:15.6.30097

Trust: 0.3

vendor:adobemodel:acrobat dcscope:neversion:15.010.20056

Trust: 0.3

vendor:adobemodel:acrobat readerscope:eqversion:11.0.08

Trust: 0.3

vendor:adobemodel:download managerscope:eqversion:0

Trust: 0.3

vendor:adobemodel:acrobat dcscope:eqversion:2015.006.30033

Trust: 0.3

vendor:adobemodel:acrobatscope:eqversion:11.0

Trust: 0.3

vendor:adobemodel:acrobat dcscope:neversion:15.006.30119

Trust: 0.3

vendor:adobemodel:acrobat reader dcscope:eqversion:2015.009.20069

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:11.0.10

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:11.0.4

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:11.0.1

Trust: 0.3

vendor:adobemodel:acrobat reader dcscope:eqversion:15.9.20077

Trust: 0.3

vendor:adobemodel:acrobat dcscope:eqversion:2015.007.20033

Trust: 0.3

vendor:adobemodel:readerscope:neversion:11.0.14

Trust: 0.3

vendor:adobemodel:acrobat reader dcscope:eqversion:15.6.30097

Trust: 0.3

vendor:adobemodel:acrobat readerscope:eqversion:11.0.01

Trust: 0.3

vendor:adobemodel:acrobat readerscope:eqversion:11.0.05

Trust: 0.3

vendor:adobemodel:acrobat reader dcscope:eqversion:2015.8.20082

Trust: 0.3

vendor:adobemodel:acrobat dcscope:eqversion:2015.006.30094

Trust: 0.3

vendor:adobemodel:acrobat reader dcscope:neversion:15.010.20056

Trust: 0.3

vendor:adobemodel:acrobat reader dcscope:eqversion:2015.006.30033

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:11.0.12

Trust: 0.3

vendor:adobemodel:acrobat reader dcscope:neversion:15.006.30119

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:11.0.08

Trust: 0.3

vendor:adobemodel:acrobatscope:neversion:11.0.14

Trust: 0.3

vendor:adobemodel:acrobat readerscope:eqversion:11.0.06

Trust: 0.3

vendor:adobemodel:acrobat dcscope:eqversion:2015.008.20082

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:11.0.337

Trust: 0.3

vendor:adobemodel:acrobatscope:eqversion:11.0.08

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:11.0.11

Trust: 0.3

vendor:adobemodel:acrobat reader dcscope:eqversion:2015.6.30060

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:11.0.7

Trust: 0.3

vendor:adobemodel:acrobat reader dcscope:eqversion:2015.007.20033

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:11.0.13

Trust: 0.3

vendor:adobemodel:acrobat dcscope:eqversion:2015.009.20069

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:11.0.09

Trust: 0.3

vendor:adobemodel:acrobat reader dcscope:eqversion:2015.006.30094

Trust: 0.3

vendor:adobemodel:acrobat dcscope:eqversion:15.9.20077

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:11.0.6

Trust: 0.3

vendor:adobemodel:acrobat dcscope:eqversion:2015.006.30060

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:11.0.05

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:11.0.3

Trust: 0.3

sources: BID: 80362 // JVNDB: JVNDB-2016-001049 // CNNVD: CNNVD-201601-247 // NVD: CVE-2016-0947

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-0947
value: HIGH

Trust: 1.0

NVD: CVE-2016-0947
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201601-247
value: HIGH

Trust: 0.6

VULHUB: VHN-88457
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2016-0947
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-88457
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2016-0947
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.0

Trust: 1.0

sources: VULHUB: VHN-88457 // JVNDB: JVNDB-2016-001049 // CNNVD: CNNVD-201601-247 // NVD: CVE-2016-0947

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

problemtype:CWE-Other

Trust: 0.8

sources: JVNDB: JVNDB-2016-001049 // NVD: CVE-2016-0947

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-201601-247

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-201601-247

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-001049

PATCH

title:APSB16-02url:https://helpx.adobe.com/security/products/acrobat/apsb16-02.html

Trust: 0.8

title:APSB16-02url:https://helpx.adobe.com/jp/security/products/reader/apsb16-02.html

Trust: 0.8

title:アドビ システムズ社 Adobe Reader の脆弱性に関するお知らせurl:http://www.fmworld.net/biz/common/adobe/20160114.html

Trust: 0.8

title:Multiple Adobe Repair measures for product untrusted search path vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=59594

Trust: 0.6

sources: JVNDB: JVNDB-2016-001049 // CNNVD: CNNVD-201601-247

EXTERNAL IDS

db:NVDid:CVE-2016-0947

Trust: 2.8

db:SECTRACKid:1034646

Trust: 1.1

db:JVNDBid:JVNDB-2016-001049

Trust: 0.8

db:CNNVDid:CNNVD-201601-247

Trust: 0.7

db:BIDid:80362

Trust: 0.4

db:VULHUBid:VHN-88457

Trust: 0.1

sources: VULHUB: VHN-88457 // BID: 80362 // JVNDB: JVNDB-2016-001049 // CNNVD: CNNVD-201601-247 // NVD: CVE-2016-0947

REFERENCES

url:https://helpx.adobe.com/security/products/acrobat/apsb16-02.html

Trust: 2.0

url:http://www.securitytracker.com/id/1034646

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-0947

Trust: 0.8

url:https://www.ipa.go.jp/security/ciadr/vul/20160113-adobereader.html

Trust: 0.8

url:http://www.jpcert.or.jp/at/2016/at160003.html

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-0947

Trust: 0.8

url:http://www.npa.go.jp/cyberpolice/topics/?seq=17575

Trust: 0.8

url:http://www.adobe.com

Trust: 0.3

url:https://helpx.adobe.com/security/products/reader/apsb16-02.html

Trust: 0.3

sources: VULHUB: VHN-88457 // BID: 80362 // JVNDB: JVNDB-2016-001049 // CNNVD: CNNVD-201601-247 // NVD: CVE-2016-0947

CREDITS

Vladimir Dubrovin, Eric Lawrence, and KeLiu of Tencent's Xuanwu LAB

Trust: 0.3

sources: BID: 80362

SOURCES

db:VULHUBid:VHN-88457
db:BIDid:80362
db:JVNDBid:JVNDB-2016-001049
db:CNNVDid:CNNVD-201601-247
db:NVDid:CVE-2016-0947

LAST UPDATE DATE

2024-11-23T21:43:24+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-88457date:2016-12-07T00:00:00
db:BIDid:80362date:2016-01-12T00:00:00
db:JVNDBid:JVNDB-2016-001049date:2016-01-15T00:00:00
db:CNNVDid:CNNVD-201601-247date:2016-01-15T00:00:00
db:NVDid:CVE-2016-0947date:2024-11-21T02:42:41.627

SOURCES RELEASE DATE

db:VULHUBid:VHN-88457date:2016-01-14T00:00:00
db:BIDid:80362date:2016-01-12T00:00:00
db:JVNDBid:JVNDB-2016-001049date:2016-01-15T00:00:00
db:CNNVDid:CNNVD-201601-247date:2016-01-15T00:00:00
db:NVDid:CVE-2016-0947date:2016-01-14T05:59:15.800