First published: Wed Oct 14 2015(Updated: )
The ANSendForBrowserReview method in Adobe Reader and Acrobat 10.x before 10.1.16 and 11.x before 11.0.13, Acrobat and Acrobat Reader DC Classic before 2015.006.30094, and Acrobat and Acrobat Reader DC Continuous before 2015.009.20069 on Windows and OS X allows attackers to bypass JavaScript API execution restrictions via unspecified vectors, a different vulnerability than CVE-2015-6707, CVE-2015-6708, CVE-2015-6709, CVE-2015-6710, CVE-2015-6711, CVE-2015-6712, CVE-2015-6713, CVE-2015-6714, CVE-2015-6715, CVE-2015-6716, CVE-2015-6717, CVE-2015-6718, CVE-2015-6719, CVE-2015-6720, CVE-2015-6721, CVE-2015-6722, CVE-2015-6723, CVE-2015-6724, CVE-2015-6725, CVE-2015-7614, CVE-2015-7616, CVE-2015-7618, CVE-2015-7619, and CVE-2015-7623.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Adobe Acrobat Reader | >=10.0<=10.1.15 | |
Adobe Acrobat Reader | >=11.0.0<=11.0.12 | |
Adobe Acrobat DC | >=15.006.30060<15.006.30094 | |
Adobe Acrobat DC | >=15.008.20082<15.009.20069 | |
Adobe Acrobat Reader | >=10.0<=10.1.15 | |
Adobe Acrobat Reader | >=11.0.0<=11.0.12 | |
Adobe Acrobat DC | >=15.006.30060<15.006.30094 | |
Adobe Acrobat DC | >=15.008.20082<15.009.20069 | |
Apple macOS | ||
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-7620 is classified as a critical vulnerability due to its potential to allow attackers to bypass security restrictions in Adobe products.
To fix CVE-2015-7620, update your Adobe Acrobat or Reader to the latest versions specified in the security announcement.
CVE-2015-7620 affects Adobe Acrobat and Reader 10.x versions prior to 10.1.16, 11.x prior to 11.0.13, and various versions of Acrobat and Reader DC.
Yes, CVE-2015-7620 can potentially be exploited remotely through malicious PDF files.
The potential impacts of CVE-2015-7620 include unauthorized actions through JavaScript execution, which may compromise system security.