First published: Fri Aug 11 2017(Updated: )
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable memory corruption vulnerability in the image conversion engine when processing Enhanced Metafile Format (EMF) data related to drawing ASCII text string. Successful exploitation could lead to arbitrary code execution.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Adobe Acrobat Reader | >=11.0.0<=11.0.20 | |
Adobe Acrobat Reader | >=17.011.00000<=17.011.30066 | |
Adobe Acrobat Reader DC | >=15.006.30060<=15.006.30306 | |
Adobe Acrobat Reader DC | >=15.007.20033<=17.009.20058 | |
Adobe Acrobat Reader Notification Manager | >=17.011.00000<=17.011.30066 | |
Adobe Acrobat Reader | >=15.006.30060<=15.006.30306 | |
Adobe Acrobat Reader | >=15.007.20033<=17.009.20058 | |
Adobe Acrobat Reader | >=11.0.0<=11.0.20 | |
Apple iOS and macOS | ||
Microsoft Windows Operating System |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-11262 has a critical severity rating due to its potential to allow remote code execution through memory corruption.
To mitigate CVE-2017-11262, users should update Adobe Acrobat Reader or Acrobat DC to the latest version available.
CVE-2017-11262 affects Adobe Acrobat Reader versions 11.0.20 and earlier, Acrobat DC up to 17.009.20058, and earlier software versions.
Ignoring CVE-2017-11262 can lead to exploitation that allows attackers to take control of affected systems remotely.
CVE-2017-11262 exploits a vulnerability in the image conversion engine when processing Enhanced Metafile Format (EMF) data, specifically targeting memory corruption.