First published: Mon Jul 09 2018(Updated: )
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have a Use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Adobe Acrobat Dc | >=15.006.30060<=15.006.30417 | |
Adobe Acrobat Dc | >=15.008.20082<=18.011.20038 | |
Adobe Acrobat Dc | >=17.011.30059<=17.011.30079 | |
Adobe Acrobat Reader DC | >=15.006.30060<=15.006.30417 | |
Adobe Acrobat Reader DC | >=15.008.20082<=18.011.20038 | |
Adobe Acrobat Reader DC | >=17.011.30059<=17.011.30079 | |
Apple Mac OS X | ||
Microsoft Windows | ||
Adobe Acrobat Pro DC |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for Adobe Acrobat Pro DC PDF Font Parsing Use-After-Free Remote Code Execution Vulnerability is CVE-2018-4971.
The vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Acrobat Pro DC through the parsing of PDF font files.
Adobe Acrobat Pro DC versions between 15.006.30060 and 15.006.30417, and versions between 17.011.30059 and 17.011.30079, are affected by this vulnerability.
Yes, user interaction is required to exploit this vulnerability. The target must visit a malicious page or open a malicious file.
The Adobe Acrobat Pro DC PDF Font Parsing Use-After-Free Remote Code Execution Vulnerability has a severity rating of 8.8, which is considered high.