CVE-2015-8458

Heap-based buffer overflow in AGM.dll in Adobe Reader and Acrobat 10.x before 10.1.16 and 11.x before 11.0.13, Acrobat and Acrobat Reader DC Classic before 2015.006.30094, and Acrobat and Acrobat Reader DC Continuous before 2015.009.20069 on Windows and OS X allows attackers to execute arbitrary code via a multiple-layer PDF document, a different vulnerability than CVE-2015-6696 and CVE-2015-6698.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*
cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*
cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*
cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*
OR cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

21 Nov 2024, 02:38

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/79208 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/79208 - Third Party Advisory, VDB Entry
References () http://www.zerodayinitiative.com/advisories/ZDI-15-637 - Third Party Advisory, VDB Entry () http://www.zerodayinitiative.com/advisories/ZDI-15-637 - Third Party Advisory, VDB Entry
References () https://helpx.adobe.com/security/products/acrobat/apsb15-24.html - Patch, Vendor Advisory () https://helpx.adobe.com/security/products/acrobat/apsb15-24.html - Patch, Vendor Advisory

Information

Published : 2015-12-21 11:59

Updated : 2024-11-21 02:38


NVD link : CVE-2015-8458

Mitre link : CVE-2015-8458

CVE.ORG link : CVE-2015-8458


JSON object : View

Products Affected

apple

  • macos

adobe

  • acrobat_dc
  • acrobat_reader
  • acrobat_reader_dc
  • acrobat

microsoft

  • windows
CWE
CWE-787

Out-of-bounds Write