The NtSetInformationFile system call hook feature in Adobe Reader and Acrobat 10.x before 10.1.12 and 11.x before 11.0.09 on Windows allows attackers to bypass a sandbox protection mechanism, and consequently execute native code in a privileged context, via an NTFS junction attack.
References
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
History
21 Nov 2024, 02:02
Type | Values Removed | Values Added |
---|---|---|
References | () http://helpx.adobe.com/security/products/reader/apsb14-20.html - Patch, Vendor Advisory | |
References | () http://www.securityfocus.com/bid/69828 - | |
References | () http://www.securitytracker.com/id/1030853 - | |
References | () https://code.google.com/p/google-security-research/issues/detail?id=94 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/96000 - |
Information
Published : 2014-09-17 10:55
Updated : 2024-11-21 02:02
NVD link : CVE-2014-0568
Mitre link : CVE-2014-0568
CVE.ORG link : CVE-2014-0568
JSON object : View
Products Affected
adobe
- acrobat_reader
- acrobat
microsoft
- windows
CWE