First published: Wed Nov 04 2015(Updated: )
Adobe Reader and Acrobat 10.x before 10.1.16 and 11.x before 11.0.13, Acrobat and Acrobat Reader DC Classic before 2015.006.30094, and Acrobat and Acrobat Reader DC Continuous before 2015.009.20069 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (out-of-bounds read and memory corruption) via a crafted CMAP table in a PDF document, a different vulnerability than CVE-2015-6685, CVE-2015-6686, CVE-2015-6693, CVE-2015-6694, CVE-2015-6695, and CVE-2015-7622.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Adobe Acrobat Reader | >=10.0<=10.1.15 | |
Adobe Acrobat Reader | >=11.0.0<=11.0.12 | |
Adobe Acrobat DC | >=15.006.30060<15.006.30094 | |
Adobe Acrobat DC | >=15.008.20082<15.009.20069 | |
Adobe Acrobat Reader | >=10.0<=10.1.15 | |
Adobe Acrobat Reader | >=11.0.0<=11.0.12 | |
Adobe Acrobat DC | >=15.006.30060<15.006.30094 | |
Adobe Acrobat DC | >=15.008.20082<15.009.20069 | |
Apple macOS | ||
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-7650 is rated as critical due to the potential for remote code execution and denial of service.
To fix CVE-2015-7650, update Adobe Reader and Acrobat to the latest versions as recommended by Adobe.
CVE-2015-7650 affects Adobe Reader and Acrobat 10.x versions before 10.1.16 and 11.x versions before 11.0.13, as well as specified versions of Acrobat DC.
Yes, CVE-2015-7650 can be exploited remotely, allowing attackers to execute arbitrary code.
There are currently no effective workarounds for CVE-2015-7650; upgrading is the recommended action.