First published: Fri Aug 11 2017(Updated: )
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable memory corruption vulnerability in the font parsing, where the font is embedded in the XML Paper Specification (XPS) file. Successful exploitation could lead to arbitrary code execution.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Adobe Acrobat Reader | >=11.0.0<=11.0.20 | |
Adobe Acrobat Reader | >=17.011.00000<=17.011.30066 | |
Adobe Acrobat | >=15.006.30060<=15.006.30306 | |
Adobe Acrobat | >=15.007.20033<=17.009.20058 | |
Adobe Acrobat Reader | >=17.011.00000<=17.011.30066 | |
Adobe Acrobat Reader | >=15.006.30060<=15.006.30306 | |
Adobe Acrobat Reader | >=15.007.20033<=17.009.20058 | |
Adobe Acrobat Reader | >=11.0.0<=11.0.20 | |
Apple iOS and macOS | ||
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-11210 is considered to have a critical severity due to its potential for exploitation via memory corruption.
To fix CVE-2017-11210, users should update Adobe Acrobat Reader or Adobe Acrobat to the latest version released by Adobe.
Affected software versions for CVE-2017-11210 include Adobe Acrobat Reader versions up to 11.0.20 and various 2015 and 2017 editions.
CVE-2017-11210 can be exploited through crafted XPS files containing malicious fonts that trigger memory corruption.
Yes, there are known exploits for CVE-2017-11210 that can lead to arbitrary code execution if successful.