Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by a Use After Free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
References
Link | Resource |
---|---|
https://helpx.adobe.com/security/products/acrobat/apsb23-30.html | Release Notes Vendor Advisory |
https://helpx.adobe.com/security/products/acrobat/apsb23-30.html | Release Notes Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
History
21 Nov 2024, 07:56
Type | Values Removed | Values Added |
---|---|---|
References | () https://helpx.adobe.com/security/products/acrobat/apsb23-30.html - Release Notes, Vendor Advisory |
15 Aug 2023, 17:33
Type | Values Removed | Values Added |
---|---|---|
First Time |
Microsoft
Apple Adobe acrobat Adobe Microsoft windows Adobe acrobat Reader Adobe acrobat Dc Adobe acrobat Reader Dc Apple macos |
|
References | (MISC) https://helpx.adobe.com/security/products/acrobat/apsb23-30.html - Release Notes, Vendor Advisory | |
CPE | cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:* cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:* cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:* cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* |
10 Aug 2023, 14:47
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-08-10 14:15
Updated : 2024-11-21 07:56
NVD link : CVE-2023-29303
Mitre link : CVE-2023-29303
CVE.ORG link : CVE-2023-29303
JSON object : View
Products Affected
apple
- macos
adobe
- acrobat
- acrobat_reader
- acrobat_reader_dc
- acrobat_dc
microsoft
- windows
CWE
CWE-416
Use After Free