Thank you for subscribing to Digital Vaccine updates brought to you by Trend Micro™ TippingPoint DVLabs. New content is now available at the Threat Management Center (TMC): https://tmc.tippingpoint.com. Note: This is an out-of-band DV release to addresses the Adobe Security Bulletin APSB19-49. The regular weekly DV will be published as scheduled on Tuesday, October 22, 2019. SMS customers can update the Digital Vaccine through the SMS client. From the top line menu, you can open the "File > Download Digital Vaccine from TMC" menu item to detect and load the latest update. |
System Requirements |
The 3.2.0 DV will run on IPS devices with TOS v3.2.0 and above, all NGFW and all TPS systems. The 4.0.0 DV will only run on the Virtual Threat Protection System (vTPS) appliance. Please note that vTPS does not currently support pre-disclosed ZDI filters. |
Adobe Security Bulletins This DV includes coverage for the Adobe vulnerabilities released on or before October 15, 2019. The following table maps TippingPoint filters to the Adobe CVEs. | |||
Bulletin # | CVE # | Filter # | Status |
APSB19-49 | CVE-2019-8064 | *35688 | |
APSB19-49 | CVE-2019-8160 | 36370 | |
APSB19-49 | CVE-2019-8161 | 36371 | |
APSB19-49 | CVE-2019-8162 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
APSB19-49 | CVE-2019-8163 | *36052 | |
APSB19-49 | CVE-2019-8164 | 36372 | |
APSB19-49 | CVE-2019-8165 | *36032 | |
APSB19-49 | CVE-2019-8166 | *36335 | |
APSB19-49 | CVE-2019-8167 | 36373 | |
APSB19-49 | CVE-2019-8168 | 36374 | |
APSB19-49 | CVE-2019-8169 | 36375 | |
APSB19-49 | CVE-2019-8170 | *35580 | |
APSB19-49 | CVE-2019-8171 | *35579 | |
APSB19-49 | CVE-2019-8172 | *35620 | |
APSB19-49 | CVE-2019-8173 | *35692 | |
APSB19-49 | CVE-2019-8174 | *35687 | |
APSB19-49 | CVE-2019-8175 | *35702 | |
APSB19-49 | CVE-2019-8176 | *35691 | |
APSB19-49 | CVE-2019-8177 | *35705 | |
APSB19-49 | CVE-2019-8178 | *35704 | |
APSB19-49 | CVE-2019-8179 | *35703 | |
APSB19-49 | CVE-2019-8180 | *35701 | |
APSB19-49 | CVE-2019-8181 | *35700 | |
APSB19-49 | CVE-2019-8182 | 36390 | |
APSB19-49 | CVE-2019-8183 | 36391 | |
APSB19-49 | CVE-2019-8184 | 36392 | |
APSB19-49 | CVE-2019-8185 | 36393 | |
APSB19-49 | CVE-2019-8186 | 36394 | |
APSB19-49 | CVE-2019-8187 | *36055 | |
APSB19-49 | CVE-2019-8188 | *36054 | |
APSB19-49 | CVE-2019-8189 | *36053 | |
APSB19-49 | CVE-2019-8190 | *36033 | |
APSB19-49 | CVE-2019-8191 | *36031 | |
APSB19-49 | CVE-2019-8192 | *36018 | |
APSB19-49 | CVE-2019-8193 | 36403 | |
APSB19-49 | CVE-2019-8194 | 36404 | |
APSB19-49 | CVE-2019-8195 | 36405 | |
APSB19-49 | CVE-2019-8196 | 36406 | |
APSB19-49 | CVE-2019-8197 | 36407 | |
APSB19-49 | CVE-2019-8198 | 36408 | |
APSB19-49 | CVE-2019-8199 | 36409 | |
APSB19-49 | CVE-2019-8200 | 36410 | |
APSB19-49 | CVE-2019-8201 | 36411 | |
APSB19-49 | CVE-2019-8202 | 36412 | |
APSB19-49 | CVE-2019-8203 | *36173 | |
APSB19-49 | CVE-2019-8204 | *36106 | |
APSB19-49 | CVE-2019-8205 | 36415 | |
APSB19-49 | CVE-2019-8206 | 36416 | |
APSB19-49 | CVE-2019-8207 | 36417 | |
APSB19-49 | CVE-2019-8208 | 36418 | |
APSB19-49 | CVE-2019-8209 | *36146 | |
APSB19-49 | CVE-2019-8210 | *36147 | |
APSB19-49 | CVE-2019-8211 | 36421 | |
APSB19-49 | CVE-2019-8212 | 36422 | |
APSB19-49 | CVE-2019-8213 | 36423 | |
APSB19-49 | CVE-2019-8214 | 36424 | |
APSB19-49 | CVE-2019-8215 | 36425 | |
APSB19-49 | CVE-2019-8216 | 36426 | |
APSB19-49 | CVE-2019-8217 | *36107 | |
APSB19-49 | CVE-2019-8218 | 36428 | |
APSB19-49 | CVE-2019-8219 | 36429 | |
APSB19-49 | CVE-2019-8220 | 36431 | |
APSB19-49 | CVE-2019-8221 | 36432 | |
APSB19-49 | CVE-2019-8222 | 36433 | |
APSB19-49 | CVE-2019-8223 | 36434 | |
APSB19-49 | CVE-2019-8224 | 36435 | |
APSB19-49 | CVE-2019-8225 | *36278 | |
APSB19-49 | CVE-2019-8226 | Vendor Deemed Reproducibility or Exploitation Unlikely | |
* shipped prior to this DV, providing zero-day protection. |
The Digital Vaccine can be manually downloaded from the following URLs: https://tmc.tippingpoint.com/TMC/ViewPackage?parentFolderId=digital_vaccines&contentId=SIG_3.2.0_9344.pkg https://tmc.tippingpoint.com/TMC/ViewPackage?parentFolderId=vsa_dv&contentId=SIG_VTPS_4.0.0_9344.pkg |
Update Details
Table of Contents
--------------------------
Filters
New Filters - 38
Modified Filters (logic changes) - 28
Modified Filters (metadata changes only) - 0
Removed Filters - 0
Filters
----------------
New Filters:
36370: HTTP: Adobe Acrobat Reader Cross-Site Scripting Vulnerability - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Category: Exploits - Severity: Critical - Description: This filter detects an attempt to exploit a cross-site scripting vulnerability in Adobe Acrobat Reader. - Deployments: - Deployment: Security-Optimized (Block / Notify) - References: - Common Vulnerabilities and Exposures: CVE-2019-8160 - Classification: Vulnerability - Other - Protocol: HTTP - Platform: Multi-Platform Client Application 36371: HTTP: Adobe Acrobat Reader Type Confusion Vulnerability - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Category: Exploits - Severity: Critical - Description: This filter detects an attempt to exploit a type confusion vulnerability in Adobe Acrobat Reader. - Deployments: - Deployment: Security-Optimized (Block / Notify) - References: - Common Vulnerabilities and Exposures: CVE-2019-8161 - Classification: Vulnerability - Other - Protocol: HTTP - Platform: Multi-Platform Client Application 36372: HTTP: Adobe Acrobat Reader Out-of-Bounds Read Vulnerability - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Category: Exploits - Severity: High - Description: This filter detects an attempt to exploit an out-of-bounds read vulnerability in Adobe Acrobat Reader. - Deployments: - Deployment: Default (Block / Notify) - Deployment: Performance-Optimized (Disabled) - References: - Common Vulnerabilities and Exposures: CVE-2019-8164 - Classification: Vulnerability - Other - Protocol: HTTP - Platform: Multi-Platform Client Application 36373: HTTP: Adobe Acrobat Reader Type Confusion Vulnerability - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Category: Exploits - Severity: Critical - Description: This filter detects an attempt to exploit a type confusion vulnerability in Adobe Acrobat Reader. - Deployments: - Deployment: Security-Optimized (Block / Notify) - References: - Common Vulnerabilities and Exposures: CVE-2019-8167 - Classification: Vulnerability - Other - Protocol: HTTP - Platform: Multi-Platform Client Application 36374: HTTP: Adobe Acrobat Reader Out-of-Bounds Read Vulnerability - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Category: Exploits - Severity: Critical - Description: This filter detects an attempt to exploit a out-of-bounds read vulnerability in Adobe Acrobat Reader. - Deployments: - Deployment: Security-Optimized (Block / Notify) - References: - Common Vulnerabilities and Exposures: CVE-2019-8168 - Classification: Vulnerability - Other - Protocol: HTTP - Platform: Multi-Platform Client Application 36375: HTTP: Adobe Acrobat Reader Type Confusion Vulnerability - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Category: Exploits - Severity: Critical - Description: This filter detects an attempt to exploit a type confusion vulnerability in Adobe Acrobat Reader. - Deployments: - Deployment: Security-Optimized (Block / Notify) - References: - Common Vulnerabilities and Exposures: CVE-2019-8169 - Classification: Vulnerability - Other - Protocol: HTTP - Platform: Multi-Platform Client Application 36390: HTTP: Adobe Acrobat Reader Out-of-Bounds Read Vulnerability - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Category: Exploits - Severity: Critical - Description: This filter detects an attempt to exploit a out-of-bounds read vulnerability in Adobe Acrobat Reader. - Deployments: - Deployment: Security-Optimized (Block / Notify) - References: - Common Vulnerabilities and Exposures: CVE-2019-8182 - Classification: Vulnerability - Other - Protocol: HTTP - Platform: Multi-Platform Client Application 36391: HTTP: Adobe Acrobat Reader AcroForm Widget Buffer Overflow Vulnerability - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Category: Exploits - Severity: Critical - Description: This filter detects an attempt to exploit a buffer overflow vulnerability in Adobe Acrobat Reader. - Deployments: - Deployment: Default (Block / Notify) - Deployment: Performance-Optimized (Disabled) - References: - Common Vulnerabilities and Exposures: CVE-2019-8183 - Classification: Vulnerability - Buffer/Heap Overflow - Protocol: HTTP - Platform: Multi-Platform Client Application 36392: HTTP: Adobe Acrobat Reader Out-of-Bounds Read Vulnerability - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Category: Exploits - Severity: High - Description: This filter detects an attempt to exploit an out-of-bounds read vulnerability in Adobe Acrobat Reader. - Deployments: - Deployment: Security-Optimized (Block / Notify) - References: - Common Vulnerabilities and Exposures: CVE-2019-8184 - Classification: Vulnerability - Other - Protocol: HTTP - Platform: Multi-Platform Client Application 36393: HTTP: Adobe Acrobat Reader Out-of-Bounds Read Vulnerability - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Category: Exploits - Severity: High - Description: This filter detects an attempt to exploit an out-of-bounds read vulnerability in Adobe Acrobat Reader. - Deployments: - Deployment: Security-Optimized (Block / Notify) - References: - Common Vulnerabilities and Exposures: CVE-2019-8185 - Classification: Vulnerability - Other - Protocol: HTTP - Platform: Multi-Platform Client Application 36394: HTTP: Adobe Acrobat Reader Out-of-Bounds Write Vulnerability - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Category: Exploits - Severity: Critical - Description: This filter detects an attempt to exploit an out-of-bounds write vulnerability in Adobe Acrobat Reader. - Deployments: - Deployment: Default (Block / Notify) - Deployment: Performance-Optimized (Disabled) - References: - Common Vulnerabilities and Exposures: CVE-2019-8186 - Classification: Vulnerability - Other - Protocol: HTTP - Platform: Multi-Platform Client Application 36403: HTTP: Adobe Acrobat Reader Out-of-Bounds Read Vulnerability - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Category: Exploits - Severity: Critical - Description: This filter detects an attempt to exploit a out-of-bounds read vulnerability in Adobe Acrobat Reader. - Deployments: - Deployment: Security-Optimized (Block / Notify) - References: - Common Vulnerabilities and Exposures: CVE-2019-8193 - Classification: Vulnerability - Other - Protocol: HTTP - Platform: Multi-Platform Client Application 36404: HTTP: Adobe Acrobat Reader Widget Out-of-Bounds Read Vulnerability - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Category: Exploits - Severity: High - Description: This filter detects an attempt to exploit an out-of-bounds read vulnerability in Adobe Acrobat Reader. - Deployments: - Deployment: Security-Optimized (Block / Notify) - References: - Common Vulnerabilities and Exposures: CVE-2019-8194 - Classification: Vulnerability - Other - Protocol: HTTP - Platform: Multi-Platform Client Application 36405: HTTP: Adobe Acrobat Reader Untrusted Pointer Dereference Vulnerability - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Category: Exploits - Severity: Critical - Description: This filter detects an attempt to exploit a untrusted pointer dereference vulnerability in Adobe Acrobat Reader. - Deployments: - Deployment: Security-Optimized (Block / Notify) - References: - Common Vulnerabilities and Exposures: CVE-2019-8195 - Classification: Vulnerability - Other - Protocol: HTTP - Platform: Multi-Platform Client Application 36406: HTTP: Adobe Acrobat Reader Font Untrusted Pointer Dereference Vulnerability - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Category: Exploits - Severity: Critical - Description: This filter detects an attempt to exploit an untrusted pointer dereference vulnerability in Adobe Acrobat Reader. - Deployments: - Deployment: Default (Block / Notify) - Deployment: Performance-Optimized (Disabled) - References: - Common Vulnerabilities and Exposures: CVE-2019-8196 - Classification: Vulnerability - Other - Protocol: HTTP - Platform: Multi-Platform Client Application 36407: HTTP: Adobe Acrobat Reader JPEG 2000 Buffer Overflow Vulnerability - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Category: Exploits - Severity: Critical - Description: This filter detects an attempt to exploit a buffer overflow vulnerability in Adobe Acrobat Reader. - Deployments: - Deployment: Security-Optimized (Block / Notify) - References: - Common Vulnerabilities and Exposures: CVE-2019-8197 - Classification: Vulnerability - Buffer/Heap Overflow - Protocol: HTTP - Platform: Multi-Platform Client Application 36408: HTTP: Adobe Acrobat Reader Out-of-Bounds Read Vulnerability - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Category: Exploits - Severity: Critical - Description: This filter detects an attempt to exploit a out-of-bounds read vulnerability in Adobe Acrobat Reader. - Deployments: - Deployment: Security-Optimized (Block / Notify) - References: - Common Vulnerabilities and Exposures: CVE-2019-8198 - Classification: Vulnerability - Other - Protocol: HTTP - Platform: Multi-Platform Client Application 36409: HTTP: Adobe Acrobat Reader Out-of-Bounds Write Vulnerability - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Category: Exploits - Severity: Critical - Description: This filter detects an attempt to exploit a out-of-bounds write vulnerability in Adobe Acrobat Reader. - Deployments: - Deployment: Security-Optimized (Block / Notify) - References: - Common Vulnerabilities and Exposures: CVE-2019-8199 - Classification: Vulnerability - Other - Protocol: HTTP - Platform: Multi-Platform Client Application 36410: HTTP: Adobe Acrobat Reader Type Confusion Vulnerability - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Category: Exploits - Severity: Critical - Description: This filter detects an attempt to exploit a type confusion vulnerability in Adobe Acrobat Reader. - Deployments: - Deployment: Security-Optimized (Block / Notify) - References: - Common Vulnerabilities and Exposures: CVE-2019-8200 - Classification: Vulnerability - Other - Protocol: HTTP - Platform: Multi-Platform Client Application 36411: HTTP: Adobe Acrobat Reader Out-of-Bounds Read Vulnerability - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Category: Exploits - Severity: Critical - Description: This filter detects an attempt to exploit a out-of-bounds read vulnerability in Adobe Acrobat Reader. - Deployments: - Deployment: Security-Optimized (Block / Notify) - References: - Common Vulnerabilities and Exposures: CVE-2019-8201 - Classification: Vulnerability - Other - Protocol: HTTP - Platform: Multi-Platform Client Application 36412: HTTP: Adobe Acrobat Reader Out-of-Bounds Read Vulnerability - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Category: Exploits - Severity: Critical - Description: This filter detects an attempt to exploit a out-of-bounds read vulnerability in Adobe Acrobat Reader. - Deployments: - Deployment: Security-Optimized (Block / Notify) - References: - Common Vulnerabilities and Exposures: CVE-2019-8202 - Classification: Vulnerability - Other - Protocol: HTTP - Platform: Multi-Platform Client Application 36415: HTTP: Adobe Acrobat Reader Untrusted Pointer Dereference Vulnerability - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Category: Exploits - Severity: Critical - Description: This filter detects an attempt to exploit a untrusted pointer dereference vulnerability in Adobe Acrobat Reader. - Deployments: - Deployment: Security-Optimized (Block / Notify) - References: - Common Vulnerabilities and Exposures: CVE-2019-8205 - Classification: Vulnerability - Other - Protocol: HTTP - Platform: Multi-Platform Client Application 36416: HTTP: Adobe Acrobat Reader Out-of-Bounds Write Vulnerability - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Category: Exploits - Severity: Critical - Description: This filter detects an attempt to exploit a out-of-bounds write vulnerability in Adobe Acrobat Reader. - Deployments: - Deployment: Security-Optimized (Block / Notify) - References: - Common Vulnerabilities and Exposures: CVE-2019-8206 - Classification: Vulnerability - Other - Protocol: HTTP - Platform: Multi-Platform Client Application 36417: HTTP: Adobe Acrobat Reader Out-of-Bounds Read Vulnerability - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Category: Exploits - Severity: Critical - Description: This filter detects an attempt to exploit a out-of-bounds read vulnerability in Adobe Acrobat Reader. - Deployments: - Deployment: Security-Optimized (Block / Notify) - References: - Common Vulnerabilities and Exposures: CVE-2019-8207 - Classification: Vulnerability - Other - Protocol: HTTP - Platform: Multi-Platform Client Application 36418: HTTP: Adobe Acrobat Reader Use-After-Free Vulnerability - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Category: Exploits - Severity: Critical - Description: This filter detects an attempt to exploit a use-after-free vulnerability in Adobe Acrobat Reader. - Deployments: - Deployment: Security-Optimized (Block / Notify) - References: - Common Vulnerabilities and Exposures: CVE-2019-8208 - Classification: Vulnerability - Other - Protocol: HTTP - Platform: Multi-Platform Client Application 36421: HTTP: Adobe Acrobat Reader Use-After-Free Vulnerability - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Category: Exploits - Severity: Critical - Description: This filter detects an attempt to exploit a use-after-free vulnerability in Adobe Acrobat Reader. - Deployments: - Deployment: Security-Optimized (Block / Notify) - References: - Common Vulnerabilities and Exposures: CVE-2019-8211 - Classification: Vulnerability - Other - Protocol: HTTP - Platform: Multi-Platform Client Application 36422: HTTP: Adobe Acrobat Reader Use-After-Free Vulnerability - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Category: Exploits - Severity: Critical - Description: This filter detects an attempt to exploit a use-after-free vulnerability in Adobe Acrobat Reader. - Deployments: - Deployment: Security-Optimized (Block / Notify) - References: - Common Vulnerabilities and Exposures: CVE-2019-8212 - Classification: Vulnerability - Other - Protocol: HTTP - Platform: Multi-Platform Client Application 36423: HTTP: Adobe Acrobat Reader Use-After-Free Vulnerability - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Category: Exploits - Severity: Critical - Description: This filter detects an attempt to exploit a use-after-free vulnerability in Adobe Acrobat Reader. - Deployments: - Deployment: Security-Optimized (Block / Notify) - References: - Common Vulnerabilities and Exposures: CVE-2019-8213 - Classification: Vulnerability - Other - Protocol: HTTP - Platform: Multi-Platform Client Application 36424: HTTP: Adobe Acrobat Reader Use-After-Free Vulnerability - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Category: Exploits - Severity: Critical - Description: This filter detects an attempt to exploit a use-after-free vulnerability in Adobe Acrobat Reader. - Deployments: - Deployment: Security-Optimized (Block / Notify) - References: - Common Vulnerabilities and Exposures: CVE-2019-8214 - Classification: Vulnerability - Other - Protocol: HTTP - Platform: Multi-Platform Client Application 36425: HTTP: Adobe Acrobat Reader Use-After-Free Vulnerability - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Category: Exploits - Severity: Critical - Description: This filter detects an attempt to exploit a use-after-free vulnerability in Adobe Acrobat Reader. - Deployments: - Deployment: Security-Optimized (Block / Notify) - References: - Common Vulnerabilities and Exposures: CVE-2019-8215 - Classification: Vulnerability - Other - Protocol: HTTP - Platform: Multi-Platform Client Application 36426: HTTP: Adobe Acrobat Reader Out-of-Bounds Read Vulnerability - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Category: Exploits - Severity: High - Description: This filter detects an attempt to exploit an out-of-bounds read vulnerability in Adobe Acrobat Reader. - Deployments: - Deployment: Security-Optimized (Block / Notify) - References: - Common Vulnerabilities and Exposures: CVE-2019-8216 - Classification: Vulnerability - Other - Protocol: HTTP - Platform: Multi-Platform Client Application 36428: HTTP: Adobe Acrobat Reader Out-of-Bounds Read Vulnerability - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Category: Exploits - Severity: High - Description: This filter detects an attempt to exploit an out-of-bounds read vulnerability in Adobe Acrobat Reader. - Deployments: - Deployment: Default (Block / Notify) - Deployment: Performance-Optimized (Disabled) - References: - Common Vulnerabilities and Exposures: CVE-2019-8218 - Classification: Vulnerability - Other - Protocol: HTTP - Platform: Multi-Platform Client Application 36429: HTTP: Adobe Acrobat Reader Use-After-Free Vulnerability - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Category: Exploits - Severity: Critical - Description: This filter detects an attempt to exploit a use-after-free vulnerability in Adobe Acrobat Reader. - Deployments: - Deployment: Security-Optimized (Block / Notify) - References: - Common Vulnerabilities and Exposures: CVE-2019-8219 - Classification: Vulnerability - Other - Protocol: HTTP - Platform: Multi-Platform Client Application 36431: HTTP: Adobe Acrobat Reader Use-After-Free Vulnerability - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Category: Exploits - Severity: Critical - Description: This filter detects an attempt to exploit a use-after-free vulnerability in Adobe Acrobat Reader. - Deployments: - Deployment: Security-Optimized (Block / Notify) - References: - Common Vulnerabilities and Exposures: CVE-2019-8220 - Classification: Vulnerability - Other - Protocol: HTTP - Platform: Multi-Platform Client Application 36432: HTTP: Adobe Acrobat Reader Use-After-Free Vulnerability - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Category: Exploits - Severity: Critical - Description: This filter detects an attempt to exploit a use-after-free vulnerability in Adobe Acrobat Reader. - Deployments: - Deployment: Security-Optimized (Block / Notify) - References: - Common Vulnerabilities and Exposures: CVE-2019-8221 - Classification: Vulnerability - Other - Protocol: HTTP - Platform: Multi-Platform Client Application 36433: HTTP: Adobe Acrobat Reader Out-of-Bounds Read Vulnerability - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Category: Exploits - Severity: Critical - Description: This filter detects an attempt to exploit an out-of-bounds read vulnerability in Adobe Acrobat Reader. - Deployments: - Deployment: Security-Optimized (Block / Notify) - References: - Common Vulnerabilities and Exposures: CVE-2019-8222 - Classification: Vulnerability - Other - Protocol: HTTP - Platform: Multi-Platform Client Application 36434: HTTP: Adobe Acrobat Reader Use-After-Free Vulnerability - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Category: Exploits - Severity: Critical - Description: This filter detects an attempt to exploit a use-after-free vulnerability in Adobe Acrobat Reader. - Deployments: - Deployment: Security-Optimized (Block / Notify) - References: - Common Vulnerabilities and Exposures: CVE-2019-8223 - Classification: Vulnerability - Other - Protocol: HTTP - Platform: Multi-Platform Client Application 36435: HTTP: Adobe Acrobat Reader Use-After-Free Vulnerability - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Category: Exploits - Severity: Critical - Description: This filter detects an attempt to exploit a use-after-free vulnerability in Adobe Acrobat Reader. - Deployments: - Deployment: Security-Optimized (Block / Notify) - References: - Common Vulnerabilities and Exposures: CVE-2019-8224 - Classification: Vulnerability - Other - Protocol: HTTP - Platform: Multi-Platform Client Application Modified Filters (logic changes): * = Enabled in Default deployments * 35579: HTTP: Adobe Acrobat Pro DC PostScript CharString Null Pointer Dereference Vulnerability (ZDI-19-871) - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Name changed from "35579: ZDI-CAN-8744: Zero Day Initiative Vulnerability (Adobe Acrobat Pro DC)". - Description updated. - Detection logic updated. - Vulnerability references updated. 35580: HTTP: Adobe Acrobat Pro DC PostScript File Parsing Buffer Overflow Vulnerability (ZDI-19-870) - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Name changed from "35580: ZDI-CAN-8681: Zero Day Initiative Vulnerability (Adobe Acrobat Pro DC)". - Description updated. - Detection logic updated. - Vulnerability references updated. * 35620: HTTP: Adobe Acrobat Pro DC DST File Parsing Out-Of-Bounds Read Vulnerability (ZDI-19-872) - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Name changed from "35620: ZDI-CAN-8678: Zero Day Initiative Vulnerability (Adobe Acrobat Pro DC)". - Severity changed from "Critical" to "High". - Description updated. - Detection logic updated. - Vulnerability references updated. * 35687: HTTP: Adobe Acrobat Pro DC RestorePlugInFrame Memory Corruption Vulnerability (ZDI-19-874) - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Name changed from "35687: ZDI-CAN-8689: Zero Day Initiative Vulnerability (Adobe Acrobat Pro DC)". - Description updated. - Detection logic updated. - Vulnerability references updated. 35688: HTTP: Adobe Acrobat Pro DC XFA presence Element Out-Of-Bounds Read Vulnerability (ZDI-19-876) - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Name changed from "35688: ZDI-CAN-8732: Zero Day Initiative Vulnerability (Adobe Acrobat Pro DC)". - Severity changed from "Critical" to "High". - Description updated. - Detection logic updated. - Vulnerability references updated. 35691: HTTP: Adobe Acrobat Pro DC XFA validate Event Use-After-Free Vulnerability (ZDI-19-877) - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Name changed from "35691: ZDI-CAN-8765: Zero Day Initiative Vulnerability (Adobe Acrobat Pro DC)". - Description updated. - Detection logic updated. - Vulnerability references updated. 35692: HTTP: Adobe Acrobat Pro DC Distiller JPEG Parsing Out-Of-Bounds Read Vulnerability (ZDI-19-873) - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Name changed from "35692: ZDI-CAN-8781: Zero Day Initiative Vulnerability (Adobe Acrobat Pro DC)". - Severity changed from "Critical" to "High". - Description updated. - Detection logic updated. - Vulnerability references updated. 35700: HTTP: Adobe Acrobat Pro DC DST File Parsing Use-After-Free Vulnerability (ZDI-19-882) - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Name changed from "35700: ZDI-CAN-8816: Zero Day Initiative Vulnerability (Adobe Acrobat Pro DC)". - Description updated. - Detection logic updated. - Vulnerability references updated. 35701: HTTP: Adobe Acrobat Pro DC DST File Parsing Use-After-Free Vulnerability (ZDI-19-881) - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Name changed from "35701: ZDI-CAN-8817: Zero Day Initiative Vulnerability (Adobe Acrobat Pro DC)". - Description updated. - Detection logic updated. - Vulnerability references updated. * 35702: HTTP: Adobe Acrobat Pro DC DST File Parsing Use-After-Free Vulnerability (ZDI-19-875) - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Name changed from "35702: ZDI-CAN-8818: Zero Day Initiative Vulnerability (Adobe Acrobat Pro DC)". - Description updated. - Detection logic updated. - Vulnerability references updated. 35703: HTTP: Adobe Acrobat Pro DC DST File Parsing Use-After-Free Vulnerability (ZDI-19-880) - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Name changed from "35703: ZDI-CAN-8819: Zero Day Initiative Vulnerability (Adobe Acrobat Pro DC)". - Description updated. - Detection logic updated. - Vulnerability references updated. 35704: HTTP: Adobe Acrobat Pro DC DST File Parsing Use-After-Free Vulnerability (ZDI-19-879) - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Name changed from "35704: ZDI-CAN-8820: Zero Day Initiative Vulnerability (Adobe Acrobat Pro DC)". - Description updated. - Detection logic updated. - Vulnerability references updated. 35705: HTTP: Adobe Acrobat Pro DC XFA calculate Event Use-After-Free Vulnerability (ZDI-19-878) - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Name changed from "35705: ZDI-CAN-8854: Zero Day Initiative Vulnerability (Adobe Acrobat Pro DC)". - Description updated. - Detection logic updated. - Vulnerability references updated. 36018: HTTP: Adobe Acrobat Pro DC XFA Form Use-After-Free Vulnerability (ZDI-19-890) - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Name changed from "36018: ZDI-CAN-8793: Zero Day Initiative Vulnerability (Adobe Acrobat Pro DC)". - Description updated. - Detection logic updated. - Vulnerability references updated. 36031: HTTP: Adobe Acrobat Pro DC DWT File Parsing Out-Of-Bounds Write Vulnerability (ZDI-19-889) - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Name changed from "36031: ZDI-CAN-9153: Zero Day Initiative Vulnerability (Adobe Acrobat Pro DC)". - Description updated. - Detection logic updated. - Vulnerability references updated. 36032: HTTP: Adobe Acrobat Pro DC DXF File Parsing Memory Corruption Vulnerability (ZDI-19-888) - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Name changed from "36032: ZDI-CAN-9154: Zero Day Initiative Vulnerability (Adobe Acrobat Pro DC)". - Description updated. - Detection logic updated. - Vulnerability references updated. 36033: HTTP: Adobe Acrobat Pro DC DXF File Parsing Out-Of-Bounds Read Vulnerability (ZDI-19-887) - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Name changed from "36033: ZDI-CAN-9155: Zero Day Initiative Vulnerability (Adobe Acrobat Pro DC)". - Severity changed from "Critical" to "High". - Description updated. - Detection logic updated. - Vulnerability references updated. 36052: HTTP: Adobe Acrobat Pro DC DST File Parsing Out-Of-Bounds Read Vulnerability (ZDI-19-886) - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Name changed from "36052: ZDI-CAN-9261: Zero Day Initiative Vulnerability (Adobe Acrobat Pro DC)". - Severity changed from "Critical" to "High". - Description updated. - Detection logic updated. - Vulnerability references updated. 36053: HTTP: Adobe Acrobat Pro DC DXF File Parsing Out-Of-Bounds Read Vulnerability (ZDI-19-885) - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Name changed from "36053: ZDI-CAN-9262: Zero Day Initiative Vulnerability (Adobe Acrobat Pro DC)". - Severity changed from "Critical" to "High". - Description updated. - Detection logic updated. - Vulnerability references updated. 36054: HTTP: Adobe Acrobat Pro DC DWG File Parsing Use-After-Free Vulnerability (ZDI-19-884) - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Name changed from "36054: ZDI-CAN-9263: Zero Day Initiative Vulnerability (Adobe Acrobat Pro DC)". - Severity changed from "Critical" to "High". - Description updated. - Detection logic updated. - Vulnerability references updated. 36055: HTTP: Adobe Acrobat Pro DC DWG File Parsing Use-After-Free Vulnerability (ZDI-19-883) - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Name changed from "36055: ZDI-CAN-9264: Zero Day Initiative Vulnerability (Adobe Acrobat Pro DC)". - Severity changed from "Critical" to "High". - Description updated. - Detection logic updated. - Vulnerability references updated. * 36106: HTTP: Adobe Acrobat Reader DC AcroForm Out-Of-Bounds Read Vulnerability (ZDI-19-892) - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Name changed from "36106: ZDI-CAN-8937: Zero Day Initiative Vulnerability (Adobe Acrobat Pro DC)". - Severity changed from "Critical" to "High". - Description updated. - Detection logic updated. - Vulnerability references updated. 36107: HTTP: Adobe Acrobat Reader DC XFA template Use-After-Free Vulnerability (ZDI-19-896) - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Name changed from "36107: ZDI-CAN-9329: Zero Day Initiative Vulnerability (Adobe Acrobat Pro DC)". - Description updated. - Detection logic updated. - Vulnerability references updated. 36146: HTTP: Adobe Acrobat Reader DC XFA template Use-After-Free Vulnerability (ZDI-19-893) - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Name changed from "36146: ZDI-CAN-9327: Zero Day Initiative Vulnerability (Adobe Acrobat Pro DC)". - Description updated. - Detection logic updated. - Vulnerability references updated. 36147: HTTP: Adobe Acrobat Reader DC XFA instanceManager Use-After-Free Vulnerability (ZDI-19-895) - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Name changed from "36147: ZDI-CAN-9316: Zero Day Initiative Vulnerability (Adobe Acrobat Pro DC)". - Description updated. - Detection logic updated. - Vulnerability references updated. 36173: HTTP: Adobe Acrobat Reader DC XFA Form Use-After-Free Vulnerability (ZDI-19-891) - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Name changed from "36173: ZDI-CAN-9293: Zero Day Initiative Vulnerability (Adobe Acrobat Pro DC)". - Description updated. - Detection logic updated. - Vulnerability references updated. 36278: HTTP: Adobe Acrobat Reader DC XFA Form Use-After-Free Vulnerability (ZDI-19-901) - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Name changed from "36278: ZDI-CAN-9374: Zero Day Initiative Vulnerability (Adobe Acrobat Pro DC)". - Description updated. - Detection logic updated. - Vulnerability references updated. * 36335: HTTP: Adobe Acrobat Pro DC DWF File Parsing Stack-based Buffer Overflow Vulnerability (ZDI-19-898) - IPS Version: 3.6.2 and after. - NGFW Version: 1.0.0 and after. - TPS Version: 4.0.0 and after. - vTPS Version: 4.0.1 and after. - Name changed from "36335: ZDI-CAN-9362: Zero Day Initiative Vulnerability (Adobe Acrobat Pro DC)". - Description updated. - Detection logic updated. - Vulnerability references updated. Modified Filters (metadata changes only): None Removed Filters: None
Top of the Page