CVE-2017-11232

Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable use after free vulnerability when processing Enhanced Metafile Format (EMF) data related to brush manipulation. Successful exploitation could lead to arbitrary code execution.
References
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*
cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*
cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*
cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*
cpe:2.3:a:adobe:reader:*:*:*:*:*:*:*:*
OR cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*

History

21 Nov 2024, 03:07

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/100185 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/100185 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1039098 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1039098 - Third Party Advisory, VDB Entry
References () https://helpx.adobe.com/security/products/acrobat/apsb17-24.html - Patch, Vendor Advisory () https://helpx.adobe.com/security/products/acrobat/apsb17-24.html - Patch, Vendor Advisory

Information

Published : 2017-08-11 19:29

Updated : 2024-11-21 03:07


NVD link : CVE-2017-11232

Mitre link : CVE-2017-11232

CVE.ORG link : CVE-2017-11232


JSON object : View

Products Affected

adobe

  • reader
  • acrobat_dc
  • acrobat_reader
  • acrobat_reader_dc
  • acrobat

apple

  • mac_os_x

microsoft

  • windows
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor

CWE-416

Use After Free