First published: Thu Oct 13 2016(Updated: )
Use-after-free vulnerability in Adobe Reader and Acrobat before 11.0.18, Acrobat and Acrobat Reader DC Classic before 15.006.30243, and Acrobat and Acrobat Reader DC Continuous before 15.020.20039 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-1089, CVE-2016-6944, CVE-2016-6945, CVE-2016-6946, CVE-2016-6949, CVE-2016-6952, CVE-2016-6953, CVE-2016-6961, CVE-2016-6962, CVE-2016-6963, CVE-2016-6964, CVE-2016-6965, CVE-2016-6967, CVE-2016-6968, CVE-2016-6969, CVE-2016-6971, CVE-2016-6979, CVE-2016-6988, and CVE-2016-6993.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iOS and macOS | ||
Microsoft Windows Operating System | ||
Adobe Acrobat Reader | <=11.0.17 | |
Adobe Acrobat Reader DC | <=15.006.30201 | |
Adobe Acrobat Reader DC | <=15.017.20053 | |
Adobe Acrobat Reader | <=15.006.30201 | |
Adobe Acrobat Reader | <=15.017.20053 | |
Adobe Acrobat Reader | <=11.0.17 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-1091 has been classified as a critical vulnerability due to its potential to allow attackers to execute arbitrary code.
To fix CVE-2016-1091, users should update Adobe Reader and Acrobat to the latest version released by Adobe.
CVE-2016-1091 affects Adobe Reader and Acrobat versions prior to 11.0.18 and specific versions of Acrobat and Acrobat Reader DC.
CVE-2016-1091 is classified as a use-after-free vulnerability that can lead to arbitrary code execution.
Yes, CVE-2016-1091 can potentially be exploited remotely by attackers through unspecified vectors.