First published: Wed Sep 17 2014(Updated: )
The NtSetInformationFile system call hook feature in Adobe Reader and Acrobat 10.x before 10.1.12 and 11.x before 11.0.09 on Windows allows attackers to bypass a sandbox protection mechanism, and consequently execute native code in a privileged context, via an NTFS junction attack.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Adobe Acrobat Reader Notification Manager | =10.0 | |
Adobe Acrobat Reader Notification Manager | =10.0.1 | |
Adobe Acrobat Reader Notification Manager | =10.0.2 | |
Adobe Acrobat Reader Notification Manager | =10.0.3 | |
Adobe Acrobat Reader Notification Manager | =10.1 | |
Adobe Acrobat Reader Notification Manager | =10.1.1 | |
Adobe Acrobat Reader Notification Manager | =10.1.2 | |
Adobe Acrobat Reader Notification Manager | =10.1.3 | |
Adobe Acrobat Reader Notification Manager | =10.1.4 | |
Adobe Acrobat Reader Notification Manager | =10.1.5 | |
Adobe Acrobat Reader Notification Manager | =10.1.6 | |
Adobe Acrobat Reader Notification Manager | =10.1.7 | |
Adobe Acrobat Reader Notification Manager | =10.1.8 | |
Adobe Acrobat Reader Notification Manager | =10.1.9 | |
Adobe Acrobat Reader Notification Manager | =10.1.10 | |
Adobe Acrobat Reader Notification Manager | =10.1.11 | |
Adobe Acrobat Reader Notification Manager | =11.0 | |
Adobe Acrobat Reader Notification Manager | =11.0.1 | |
Adobe Acrobat Reader Notification Manager | =11.0.2 | |
Adobe Acrobat Reader Notification Manager | =11.0.3 | |
Adobe Acrobat Reader Notification Manager | =11.0.4 | |
Adobe Acrobat Reader | =11.0.5 | |
Adobe Acrobat Reader Notification Manager | =11.0.6 | |
Adobe Acrobat Reader Notification Manager | =11.0.7 | |
Adobe Acrobat Reader Notification Manager | =11.0.8 | |
Microsoft Windows | ||
Adobe Acrobat Reader | =10.0 | |
Adobe Acrobat Reader | =10.0 | |
Adobe Acrobat Reader | =10.0.1 | |
Adobe Acrobat Reader | =10.0.1 | |
Adobe Acrobat Reader | =10.0.2 | |
Adobe Acrobat Reader | =10.0.3 | |
Adobe Acrobat Reader | =10.1 | |
Adobe Acrobat Reader | =10.1.1 | |
Adobe Acrobat Reader | =10.1.2 | |
Adobe Acrobat Reader | =10.1.3 | |
Adobe Acrobat Reader | =10.1.4 | |
Adobe Acrobat Reader | =10.1.5 | |
Adobe Acrobat Reader | =10.1.6 | |
Adobe Acrobat Reader | =10.1.7 | |
Adobe Acrobat Reader | =10.1.8 | |
Adobe Acrobat Reader | =10.1.9 | |
Adobe Acrobat Reader | =10.1.10 | |
Adobe Acrobat Reader | =10.1.11 | |
Adobe Acrobat Reader | =11.0 | |
Adobe Acrobat Reader | =11.0.1 | |
Adobe Acrobat Reader | =11.0.2 | |
Adobe Acrobat Reader | =11.0.3 | |
Adobe Acrobat Reader | =11.0.4 | |
Adobe Acrobat | =11.0.5 | |
Adobe Acrobat Reader | =11.0.6 | |
Adobe Acrobat Reader | =11.0.7 | |
Adobe Acrobat Reader | =11.0.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0568 is rated as critical due to its ability to bypass sandbox protections and execute native code.
To fix CVE-2014-0568, update Adobe Reader and Acrobat to version 10.1.12 or 11.0.09 or later.
CVE-2014-0568 affects Adobe Reader and Acrobat versions 10.x before 10.1.12 and 11.x before 11.0.09 on Windows.
CVE-2014-0568 is associated with an NTFS junction attack that allows attackers to bypass sandbox protections.
CVE-2014-0568 specifically affects systems running vulnerable versions of Adobe Reader and Acrobat, so it will not impact systems without these applications.