CVE-2017-3123

Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable memory corruption vulnerability in the image conversion engine when processing Enhanced Metafile Format (EMF) data drawing position definition. Successful exploitation could lead to arbitrary code execution.
References
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*
cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*
cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*
cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*
cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*
cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*
cpe:2.3:a:adobe:reader:*:*:*:*:*:*:*:*
OR cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*

History

21 Nov 2024, 03:24

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/100179 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/100179 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1039098 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1039098 - Third Party Advisory, VDB Entry
References () https://helpx.adobe.com/security/products/acrobat/apsb17-24.html - Patch, Vendor Advisory () https://helpx.adobe.com/security/products/acrobat/apsb17-24.html - Patch, Vendor Advisory

Information

Published : 2017-08-11 19:29

Updated : 2024-11-21 03:24


NVD link : CVE-2017-3123

Mitre link : CVE-2017-3123

CVE.ORG link : CVE-2017-3123


JSON object : View

Products Affected

apple

  • mac_os_x

adobe

  • acrobat
  • acrobat_reader_dc
  • reader
  • acrobat_dc

microsoft

  • windows
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer