First published: Sat Dec 09 2017(Updated: )
An issue was discovered in Adobe Acrobat and Reader: 2017.012.20098 and earlier versions, 2017.011.30066 and earlier versions, 2015.006.30355 and earlier versions, and 11.0.22 and earlier versions. This vulnerability leads to a stack-based buffer overflow condition in the internal Unicode string manipulation module. It is triggered by an invalid PDF file, where a crafted Unicode string causes an out of bounds memory access of a stack allocated buffer, due to improper checks when manipulating an offset of a pointer to the buffer. Attackers can exploit the vulnerability and achieve arbitrary code execution if they can effectively control the accessible memory.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Adobe Acrobat Reader | <=11.0.22 | |
Adobe Acrobat Reader | >=17.0<=17.011.30066 | |
Adobe Acrobat | >=-<=17.012.20098 | |
Adobe Acrobat | >=15.0<=15.006.30355 | |
Adobe Acrobat Reader | <=11.0.22 | |
Adobe Acrobat Reader | >=17.0<=17.011.30066 | |
Adobe Acrobat Reader | >=-<=17.012.20098 | |
Adobe Acrobat Reader | >=15.0<=15.006.30355 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-16368 has been classified as a critical vulnerability due to its potential to allow arbitrary code execution.
To fix CVE-2017-16368, update Adobe Acrobat and Reader to the latest version available.
CVE-2017-16368 affects Adobe Acrobat and Reader versions prior to 2017.012.20098, 2017.011.30066, 2015.006.30355, and 11.0.22.
The impacts of CVE-2017-16368 include the possibility of a stack-based buffer overflow, allowing an attacker to execute arbitrary code.
There are no specific workarounds for CVE-2017-16368, so applying the security updates is essential.