First published: Thu Oct 13 2016(Updated: )
Use-after-free vulnerability in Adobe Reader and Acrobat before 11.0.18, Acrobat and Acrobat Reader DC Classic before 15.006.30243, and Acrobat and Acrobat Reader DC Continuous before 15.020.20039 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-1089, CVE-2016-1091, CVE-2016-6944, CVE-2016-6945, CVE-2016-6946, CVE-2016-6949, CVE-2016-6952, CVE-2016-6953, CVE-2016-6961, CVE-2016-6962, CVE-2016-6964, CVE-2016-6965, CVE-2016-6967, CVE-2016-6968, CVE-2016-6969, CVE-2016-6971, CVE-2016-6979, CVE-2016-6988, and CVE-2016-6993.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iOS and macOS | ||
Microsoft Windows | ||
Adobe Acrobat Reader | <=11.0.17 | |
Adobe Acrobat Reader | <=15.006.30201 | |
Adobe Acrobat Reader | <=15.017.20053 | |
Adobe Acrobat Reader Notification Manager | <=15.006.30201 | |
Adobe Acrobat Reader Notification Manager | <=15.017.20053 | |
Adobe Acrobat Reader | <=11.0.17 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-6963 has been rated as critical due to its potential to allow execution of arbitrary code.
To fix CVE-2016-6963, update Adobe Reader and Acrobat to the latest version as specified in the security advisory.
CVE-2016-6963 affects Adobe Reader and Acrobat versions before 11.0.18 and various versions of Acrobat and Acrobat Reader DC before their specified thresholds.
CVE-2016-6963 is classified as a use-after-free vulnerability.
CVE-2016-6963 impacts Windows and OS X platforms running the affected versions of Adobe software.