First published: Tue Feb 27 2018(Updated: )
An issue was discovered in Adobe Acrobat Reader 2018.009.20050 and earlier versions, 2017.011.30070 and earlier versions, 2015.006.30394 and earlier versions. This vulnerability is an instance of a use after free vulnerability in the JavaScript API related to bookmark functionality. The vulnerability is triggered by crafted JavaScript code embedded within a PDF file. A successful attack can lead to code corruption, control-flow hijack, or a code re-use attack.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Adobe Acrobat Reader | >=17.0<=17.011.30070 | |
Adobe Acrobat | >=-<=18.009.20050 | |
Adobe Acrobat | >=15.0<=15.006.30394 | |
Adobe Acrobat Reader | >=17.0<=17.011.30070 | |
Adobe Acrobat Reader | >=-<=18.009.20050 | |
Adobe Acrobat Reader | >=15.0<=15.006.30394 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-4911 is rated as critical due to its impact on the security of Adobe Acrobat products.
To fix CVE-2018-4911, update Adobe Acrobat Reader or Adobe Acrobat to the latest version as recommended by Adobe.
CVE-2018-4911 affects Adobe Acrobat Reader versions up to 2018.009.20050 and earlier, as well as other specified versions of Adobe Acrobat and Acrobat DC.
CVE-2018-4911 is classified as a use after free vulnerability in the JavaScript API related to bookmarking functionality.
Yes, CVE-2018-4911 can potentially be exploited by remote attackers via crafted PDF files.