First published: Tue Feb 27 2018(Updated: )
An issue was discovered in Adobe Acrobat Reader 2018.009.20050 and earlier versions, 2017.011.30070 and earlier versions, 2015.006.30394 and earlier versions. This vulnerability occurs as a result of computation that reads data that is past the end of the target buffer; the computation is part of the string literal parser. A successful attack can lead to sensitive data exposure.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Adobe Acrobat Reader | >=17.0<=17.011.30070 | |
Adobe Acrobat Reader | >=15.0<=15.006.30394 | |
Adobe Acrobat Reader | >=18.0<=18.009.20050 | |
Adobe Acrobat Reader Notification Manager | >=17.0<=17.011.30070 | |
Adobe Acrobat Reader Notification Manager | >=15.0<=15.006.30394 | |
Adobe Acrobat Reader Notification Manager | >=18.0<=18.009.20050 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-4882 has a severity rating of critical due to its potential to allow arbitrary code execution.
To fix CVE-2018-4882, update Adobe Acrobat Reader and Acrobat DC to the latest version provided by Adobe.
CVE-2018-4882 affects Adobe Acrobat Reader 2018.009.20050 and earlier, Acrobat DC versions up to 18.009.20050, and older versions of Acrobat Reader DC.
CVE-2018-4882 is a buffer overflow vulnerability that occurs when a computation reads data beyond the end of a target buffer.
Yes, CVE-2018-4882 can potentially lead to data loss or corruption if exploited by an attacker.