CVE-2017-11256

Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable use after free vulnerability when generating content using XFA layout engine. Successful exploitation could lead to arbitrary code execution.
References
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*
cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*
cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*
cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*
cpe:2.3:a:adobe:reader:*:*:*:*:*:*:*:*
OR cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*

History

21 Nov 2024, 03:07

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/100182 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/100182 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1039098 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1039098 - Third Party Advisory, VDB Entry
References () https://helpx.adobe.com/security/products/acrobat/apsb17-24.html - Patch, Vendor Advisory () https://helpx.adobe.com/security/products/acrobat/apsb17-24.html - Patch, Vendor Advisory

Information

Published : 2017-08-11 19:29

Updated : 2024-11-21 03:07


NVD link : CVE-2017-11256

Mitre link : CVE-2017-11256

CVE.ORG link : CVE-2017-11256


JSON object : View

Products Affected

adobe

  • reader
  • acrobat_dc
  • acrobat_reader
  • acrobat_reader_dc
  • acrobat

apple

  • mac_os_x

microsoft

  • windows
CWE
CWE-416

Use After Free