First published: Wed Oct 14 2015(Updated: )
The ANSendForApproval method in Adobe Reader and Acrobat 10.x before 10.1.16 and 11.x before 11.0.13, Acrobat and Acrobat Reader DC Classic before 2015.006.30094, and Acrobat and Acrobat Reader DC Continuous before 2015.009.20069 on Windows and OS X allows attackers to bypass JavaScript API execution restrictions via unspecified vectors, a different vulnerability than CVE-2015-6707, CVE-2015-6708, CVE-2015-6709, CVE-2015-6710, CVE-2015-6711, CVE-2015-6712, CVE-2015-6713, CVE-2015-6714, CVE-2015-6715, CVE-2015-6716, CVE-2015-6717, CVE-2015-6718, CVE-2015-6719, CVE-2015-6720, CVE-2015-6721, CVE-2015-6722, CVE-2015-6723, CVE-2015-6725, CVE-2015-7614, CVE-2015-7616, CVE-2015-7618, CVE-2015-7619, CVE-2015-7620, and CVE-2015-7623.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Adobe Acrobat Reader | >=10.0<=10.1.15 | |
Adobe Acrobat Reader | >=11.0.0<=11.0.12 | |
Adobe Acrobat DC | >=15.006.30060<15.006.30094 | |
Adobe Acrobat DC | >=15.008.20082<15.009.20069 | |
Adobe Acrobat Reader | >=10.0<=10.1.15 | |
Adobe Acrobat Reader | >=11.0.0<=11.0.12 | |
Adobe Acrobat DC | >=15.006.30060<15.006.30094 | |
Adobe Acrobat DC | >=15.008.20082<15.009.20069 | |
Apple macOS | ||
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-6724 is rated as critical due to its potential for remote code execution.
To fix CVE-2015-6724, update Adobe Reader and Acrobat to the latest version that addresses this vulnerability.
CVE-2015-6724 affects Adobe Reader and Acrobat versions 10.x before 10.1.16 and 11.x before 11.0.13, as well as certain versions of Acrobat DC.
CVE-2015-6724 is a JavaScript execution vulnerability that allows attackers to bypass security mechanisms.
CVE-2015-6724 primarily affects Adobe software, and while it can run on both macOS and Windows, these operating systems themselves are not directly vulnerable.