Multiple Vulnerabilities in Adobe Acrobat and Reader Could Allow for Arbitrary Code Execution (APSB18-21)

Multiple Vulnerabilities in Adobe Acrobat and Reader Could Allow for Arbitrary Code Execution (APSB18-21)

MS-ISAC ADVISORY NUMBER:

2018-078

DATE(S) ISSUED:

07/10/2018

OVERVIEW:

Multiple vulnerabilities have been discovered in Adobe Acrobat and Reader, the most severe of which could allow for arbitrary code execution. Adobe Acrobat and Reader allow a user to view, create, manipulate, print and manage files in Portable Document Format (PDF). Successful exploitation of the most severe of these vulnerabilities could result in an attacker executing arbitrary code in the context of the affected application. Depending on the privileges associated with this application, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. If this application has been configured to have fewer user rights on the system, exploitation of the most severe of these vulnerabilities could have less impact than if it was configured with administrative rights.

THREAT INTELLIGENCE:

There are no reports of these vulnerabilities being exploited in the wild.

SYSTEMS AFFECTED:

  • Adobe Acrobat DC (Continuous Track) for Windows and Macintosh versions 2018.011.20040 and earlier
  • Adobe Acrobat Reader DC (Continuous Track) for Windows and Macintosh versions 2018.011.20040 and earlier
  • Adobe Acrobat 2017 (Classic 2017 Track) for Windows and Macintosh versions 2017.011.30080 and earlier
  • Adobe Acrobat Reader 2017 (Classic 2017 Track) for Windows and Macintosh versions 2017.011.30080 and earlier
  • Adobe Acrobat DC (Classic 2015 Track) for Windows and Macintosh versions 2015.006.30418 and earlier
  • Adobe Acrobat Reader DC (Classic 2015 Track) for Windows and Macintosh versions 2015.006.30418 and earlier

RISK:

Government:

  • Large and medium government entities: HIGH
  • Small government entities: MEDIUM

Businesses:

  • Large and medium business entities: HIGH
  • Small business entities: MEDIUM

Home Users:

LOW

TECHNICAL SUMMARY:

Multiple vulnerabilities have been discovered in Adobe Acrobat and Reader, the most severe of which could allow for arbitrary code execution. The vulnerabilities are as follows:

  • One double free vulnerability that could allow for arbitrary code execution (CVE-2018-12782)
  • Fourteen heap overflow vulnerabilities that could allow for arbitrary code execution (CVE-2018-5015, CVE-2018-5028, CVE-2018-5032, CVE-2018-5036, CVE-2018-5038, CVE-2018-5040, CVE-2018-5041, CVE-2018-5045, CVE-2018-5052, CVE-2018-5058, CVE-2018-5067, CVE-2018-12785, CVE-2018-12788, CVE-2018-12798)
  • Thirteen use-after-free vulnerabilities that could allow for arbitrary code execution (CVE-2018-5009, CVE-2018-5011, CVE-2018-5065, CVE-2018-12756, CVE-2018-12770, CVE-2018-12772, CVE-2018-12773, CVE-2018-12776, CVE-2018-12783, CVE-2018-12791, CVE-2018-12792, CVE-2018-12796, CVE-2018-12797)
  • Thirteen out-of-bounds write vulnerabilities that could allow for arbitrary code execution (CVE-2018-5020, CVE-2018-5021, CVE-2018-5042, CVE-2018-5059, CVE-2018-5064, CVE-2018-5069, CVE-2018-5070, CVE-2018-12754, CVE-2018-12755, CVE-2018-12758, CVE-2018-12760, CVE-2018-12771, CVE-2018-12787)
  • One security bypass vulnerability that could allow for privilege escalation (CVE-2018-12802)
  • Fifty-three out-of-bounds read vulnerabilities that could allow for information disclosure (CVE-2018-5010, CVE-2018-12803, CVE-2018-5014, CVE-2018-5016, CVE-2018-5017, CVE-2018-5018, CVE-2018-5019, CVE-2018-5022, CVE-2018-5023, CVE-2018-5024, CVE-2018-5025, CVE-2018-5026, CVE-2018-5027, CVE-2018-5029, CVE-2018-5031, CVE-2018-5033, CVE-2018-5035, CVE-2018-5039, CVE-2018-5044, CVE-2018-5046, CVE-2018-5047, CVE-2018-5048, CVE-2018-5049, CVE-2018-5050, CVE-2018-5051, CVE-2018-5053, CVE-2018-5054, CVE-2018-5055, CVE-2018-5056, CVE-2018-5060, CVE-2018-5061, CVE-2018-5062, CVE-2018-5063, CVE-2018-5066, CVE-2018-5068, CVE-2018-12757, CVE-2018-12761, CVE-2018-12762, CVE-2018-12763, CVE-2018-12764, CVE-2018-12765, CVE-2018-12766, CVE-2018-12767, CVE-2018-12768, CVE-2018-12774, CVE-2018-12777, CVE-2018-12779, CVE-2018-12780, CVE-2018-12781, CVE-2018-12786, CVE-2018-12789, CVE-2018-12790, CVE-2018-12795)
  • Three type confusion vulnerabilities that could allow for arbitrary code execution (CVE-2018-5057, CVE-2018-12793, CVE-2018-12794)
  • Two untrusted pointer dereferences that could allow for arbitrary code execution (CVE-2018-5012, CVE-2018-5030)
  • Four buffer error vulnerabilities that could allow for arbitrary code execution (CVE-2018-5034, CVE-2018-5037, CVE-2018-5043, CVE-2018-12784)

Successful exploitation of the most severe of these vulnerabilities could result in an attacker executing arbitrary code in the context of the affected application. Depending on the privileges associated with this application, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. If this application has been configured to have fewer user rights on the system, exploitation of the most severe of these vulnerabilities could have less impact than if it was configured with administrative rights.

RECOMENDATIONS:

We recommend the following actions be taken:

  • Install the updates provided by Adobe immediately after appropriate testing.
  • Run all software as a non-privileged user (one without administrative privileges) to diminish the effects of a successful attack.
  • Remind users not to visit websites or follow links provided by unknown or untrusted sources.
  • Inform and educate users regarding the threats posed by hypertext links contained in emails or attachments especially from un-trusted sources.
  • Apply the Principle of Least Privilege to all systems and services.

REFERENCES:

CVE:

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-5009
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-5010
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-5011
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-5012
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-5014
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-5015
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-5016
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-5017
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-5018
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-5019
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-5020
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-5021
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-5022
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-5023
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-5024
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-5025
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-5026
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-5027
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-5028
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-5029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-5030
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-5031
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-5032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-5033
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-5034
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-5035
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-5036
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-5037
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-5038
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-5039
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-5040
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-5041
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-5042
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-5043
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-5044
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-5045
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-5046
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-5047
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-5048
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-5049
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-5050
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-5051
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-5052
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-5053
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-5054
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-5055
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-5056
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-5057
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-5058
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-5059
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-5060
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-5061
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-5062
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-5063
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-5064
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-5065
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-5066
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-5067
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-5068
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-5069
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-5070
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-12754
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-12755
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-12756
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-12757
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-12758
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-12760
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-12761
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-12762
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-12763
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-12764
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-12765
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-12766
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-12767
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-12768
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-12770
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-12771
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-12772
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-12773
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-12774
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-12776
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-12777
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-12779
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-12780
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-12781
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-12782
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-12783
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-12784
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-12785
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-12786
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-12787
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-12788
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-12789
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-12790
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-12791
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-12792
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-12793
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-12794
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-12795
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-12796
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-12797
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-12798
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-12802
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-CVE-2018-12803