Acrobat Reader DC versions 2020.012.20048 (and earlier), 2020.001.30005 (and earlier) and 2017.011.30175 (and earlier) are affected by a heap-based buffer overflow vulnerability in the submitForm function, potentially resulting in arbitrary code execution in the context of the current user. Exploitation requires user interaction in that a victim must open a crafted .pdf file in Acrobat Reader.
References
Link | Resource |
---|---|
https://helpx.adobe.com/security/products/acrobat/apsb20-67.html | Vendor Advisory |
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1157 | Third Party Advisory |
https://helpx.adobe.com/security/products/acrobat/apsb20-67.html | Vendor Advisory |
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1157 | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 05:14
Type | Values Removed | Values Added |
---|---|---|
References | () https://helpx.adobe.com/security/products/acrobat/apsb20-67.html - Vendor Advisory | |
References | () https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1157 - Third Party Advisory |
Information
Published : 2020-11-05 20:15
Updated : 2024-11-21 05:14
NVD link : CVE-2020-24435
Mitre link : CVE-2020-24435
CVE.ORG link : CVE-2020-24435
JSON object : View
Products Affected
apple
- macos
adobe
- acrobat_dc
- acrobat_reader
- acrobat_reader_dc
- acrobat
microsoft
- windows
CWE
CWE-122
Heap-based Buffer Overflow