First published: Wed Apr 12 2017(Updated: )
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have an exploitable use after free vulnerability in XML Forms Architecture (XFA) related to reset form functionality. Successful exploitation could lead to arbitrary code execution.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Adobe Acrobat Reader | <=11.0.19 | |
Adobe Acrobat Reader DC | <=15.006.30280 | |
Adobe Acrobat Reader DC | <=15.023.20070 | |
Adobe Acrobat Reader | <=15.006.30280 | |
Adobe Acrobat Reader | <=15.023.20070 | |
Adobe Acrobat Reader | <=11.0.19 | |
Apple iOS and macOS | ||
Microsoft Windows Operating System |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-3014 is considered a high-severity vulnerability due to its potential for arbitrary code execution.
To fix CVE-2017-3014, update Adobe Acrobat Reader or Adobe Acrobat DC to versions later than those specified in the vulnerability description.
CVE-2017-3014 affects Adobe Acrobat Reader versions 11.0.19 and earlier, and Adobe Acrobat DC versions 15.006.30280 and earlier, as well as 15.023.20070 and earlier.
A use after free vulnerability, such as CVE-2017-3014, occurs when a program continues to use a pointer after the memory it points to has been freed, potentially allowing an attacker to execute arbitrary code.
Yes, CVE-2017-3014 can potentially be exploited remotely if a user opens a malicious PDF file.