First published: Wed Oct 14 2015(Updated: )
Adobe Reader and Acrobat 10.x before 10.1.16 and 11.x before 11.0.13, Acrobat and Acrobat Reader DC Classic before 2015.006.30094, and Acrobat and Acrobat Reader DC Continuous before 2015.009.20069 on Windows and OS X allow attackers to bypass intended access restrictions and obtain sensitive information via unspecified vectors, a different vulnerability than CVE-2015-5583, CVE-2015-6705, and CVE-2015-6706.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Adobe Acrobat Reader | >=10.0<=10.1.15 | |
Adobe Acrobat Reader | >=11.0.0<=11.0.12 | |
Adobe Acrobat DC | >=15.006.30060<15.006.30094 | |
Adobe Acrobat DC | >=15.008.20082<15.009.20069 | |
Adobe Acrobat Reader | >=10.0<=10.1.15 | |
Adobe Acrobat Reader | >=11.0.0<=11.0.12 | |
Adobe Acrobat DC | >=15.006.30060<15.006.30094 | |
Adobe Acrobat DC | >=15.008.20082<15.009.20069 | |
Apple macOS | ||
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-7624 is considered a critical vulnerability as it allows attackers to bypass intended access restrictions in Adobe Acrobat and Reader.
To fix CVE-2015-7624, users should update Adobe Acrobat and Adobe Reader to the latest versions provided by Adobe.
CVE-2015-7624 affects Adobe Reader and Acrobat 10.x before 10.1.16 and 11.x before 11.0.13, along with several versions of Acrobat DC products.
Yes, CVE-2015-7624 can lead to potential data leakage by allowing unauthorized access to sensitive information in documents.
CVE-2015-7624 affects Adobe Acrobat and Reader on both Windows and macOS platforms.