First published: Sat Apr 30 2016(Updated: )
Double free vulnerability in Adobe Reader and Acrobat before 11.0.14, Acrobat and Acrobat Reader DC Classic before 15.006.30119, and Acrobat and Acrobat Reader DC Continuous before 15.010.20056 on Windows and OS X allows attackers to execute arbitrary code via a crafted Graphics State dictionary.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Adobe Acrobat Reader | <=11.0.13 | |
Adobe Acrobat | <=15.006.30097 | |
Adobe Acrobat | <=15.009.20077 | |
Adobe Acrobat Reader | <=9.0 | |
Adobe Acrobat Reader | <=15.006.30097 | |
Adobe Acrobat Reader | <=15.009.20077 | |
Apple iOS and macOS | ||
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-1111 has a high severity rating, indicating a significant vulnerability that could allow arbitrary code execution.
To fix CVE-2016-1111, update Adobe Reader and Acrobat to the latest versions available.
CVE-2016-1111 affects Adobe Reader and Acrobat versions prior to 11.0.14 and multiple versions of Acrobat DC.
Yes, CVE-2016-1111 can be exploited remotely, allowing attackers to execute malicious code on the affected system.
There are no specific workarounds for CVE-2016-1111; updating the software is the recommended best practice.