First published: Fri Aug 11 2017(Updated: )
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable memory corruption vulnerability in the MakeAccessible plugin when parsing TrueType font data. Successful exploitation could lead to arbitrary code execution.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Adobe Acrobat Reader | >=11.0.0<11.0.21 | |
Adobe Acrobat Reader DC | >=15.000.0000<15.006.30355 | |
Adobe Acrobat Reader DC | >=17.000.0000<=17.011.30066 | |
Adobe Acrobat Reader DC | >=17.000.0000<17.012.20098 | |
Adobe Acrobat Reader | >=15.000.0000<15.006.30355 | |
Adobe Acrobat Reader | >=17.000.0000<17.011.30066 | |
Adobe Acrobat Reader | >=17.000.0000<17.012.20098 | |
Adobe Acrobat Reader | >=11.0.0<11.0.21 | |
Apple iOS and macOS | ||
Microsoft Windows Operating System |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2017-3116 is rated as critical due to its potential for arbitrary code execution.
To fix CVE-2017-3116, update Adobe Acrobat Reader and Acrobat DC to the latest version available from Adobe.
CVE-2017-3116 affects Adobe Acrobat Reader versions prior to 11.0.21 and Acrobat DC versions prior to 15.006.30355.
No, macOS is not listed as affected by CVE-2017-3116.
Yes, CVE-2017-3116 can be exploited remotely through malicious TrueType font data.