First published: Fri May 24 2019(Updated: )
Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Adobe Acrobat Reader DC | >=15.006.30060<=15.006.30464 | |
Adobe Acrobat Reader DC | >=15.008.20082<=19.010.20069 | |
Adobe Acrobat Reader DC | >=17.011.30059<=17.011.30113 | |
Adobe Acrobat Reader | >=15.006.30060<=15.006.30464 | |
Adobe Acrobat Reader | >=15.008.20082<=19.010.20069 | |
Adobe Acrobat Reader | >=17.011.30059<=17.011.30113 | |
macOS | ||
Microsoft Windows Operating System |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-7031 is rated as critical due to its potential to enable arbitrary code execution.
To fix CVE-2019-7031, update Adobe Acrobat and Reader to the latest version available.
Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2017.011.30113 and earlier, and 2015.006.30464 and earlier are all affected.
CVE-2019-7031 specifically affects Adobe Acrobat and Reader and does not directly affect the operating systems like Windows or macOS.
A use after free vulnerability, like CVE-2019-7031, occurs when a program continues to use a pointer after the memory it points to has been freed, potentially allowing for arbitrary code execution.