Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable use after free vulnerability in the XFA parsing engine when handling certain types of internal instructions. Successful exploitation could lead to arbitrary code execution.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/100182 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1039098 | Third Party Advisory VDB Entry |
https://helpx.adobe.com/security/products/acrobat/apsb17-24.html | Patch Vendor Advisory |
http://www.securityfocus.com/bid/100182 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1039098 | Third Party Advisory VDB Entry |
https://helpx.adobe.com/security/products/acrobat/apsb17-24.html | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 03:24
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/100182 - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1039098 - Third Party Advisory, VDB Entry | |
References | () https://helpx.adobe.com/security/products/acrobat/apsb17-24.html - Patch, Vendor Advisory |
Information
Published : 2017-08-11 19:29
Updated : 2024-11-21 03:24
NVD link : CVE-2017-3120
Mitre link : CVE-2017-3120
CVE.ORG link : CVE-2017-3120
JSON object : View
Products Affected
apple
- mac_os_x
adobe
- acrobat
- acrobat_reader_dc
- reader
- acrobat_dc
microsoft
- windows
CWE
CWE-416
Use After Free