Adobe FrameMaker version 2019.0.6 (and earlier versions) lacks proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. This could be exploited to execute arbitrary code with the privileges of the current user. User interaction is required to exploit this vulnerability in that the target must open a malicious FrameMaker file.
References
Link | Resource |
---|---|
https://helpx.adobe.com/security/products/framemaker/apsb20-54.html | Patch Vendor Advisory |
https://helpx.adobe.com/security/products/framemaker/apsb20-54.html | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 05:41
Type | Values Removed | Values Added |
---|---|---|
References | () https://helpx.adobe.com/security/products/framemaker/apsb20-54.html - Patch, Vendor Advisory |
Information
Published : 2020-09-10 19:15
Updated : 2024-11-21 05:41
NVD link : CVE-2020-9725
Mitre link : CVE-2020-9725
CVE.ORG link : CVE-2020-9725
JSON object : View
Products Affected
microsoft
- windows
adobe
- framemaker