Security Advisory - March 18, 2020

[Updated: March 25, 2020. Added CVE-2020-3797, CVE-2020-3800, CVE-2020-3799]

Zscaler protects against 5 new vulnerabilities for Adobe Acrobat and Reader

 

 

 

Zscaler, working with Microsoft through their MAPP program, has proactively deployed protections for the following 5 vulnerabilities included in the March 2020 Adobe security bulletins. Zscaler will continue to monitor exploits associated with all vulnerabilities in the March release and deploy additional protections as necessary.

APSB20-13 – Security updates available for Adobe Acrobat and Reader.

Adobe has released security updates for Adobe Acrobat and Reader for Windows and macOS. These updates address critical and important vulnerabilities. Successful exploitation could lead to arbitrary code execution in the context of the current user.

Affected Software

  • Acrobat DC (Continuous) 2020.006.20034 and earlier versions for Windows & macOS
  • Acrobat Reader DC (Continuous) 2020.006.20034 and earlier versions for Windows & macOS
  • Acrobat 2017 (Classic 2017) 2017.011.30158 and earlier versions for Windows & macOS
  • Acrobat Reader 2017 (Classic 2017) 2017.011.30158 and earlier versions for Windows & macOS
  • Acrobat 2015 (Classic 2015) 2015.006.30510 and earlier versions for Windows & macOS
  • Acrobat Reader 2015 (Classic 2015) 2015.006.30510 and earlier versions for Windows & macOS

CVE-2020-3804 – Out-of-bounds read Vulnerability leading to Information Disclosure.

Severity: Important

CVE-2020-3805 – Use After Free Vulnerability leading to Arbitrary Code Execution.

Severity: Critical

CVE-2020-3797 – Memory Corruption Vulnerability leading to Arbitrary Code Execution. [Updated – March 25, 2020]

Severity: Critical

CVE-2020-3800 – Memory address leak Vulnerability leading to Information Disclosure. [Updated – March 25, 2020]

Severity: Important

CVE-2020-3799 – Stack-based buffer Overflow Vulnerability leading to Arbitrary Code Execution. [Updated – March 25, 2020]

Severity: Critical