First published: Wed May 22 2019(Updated: )
Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have a use after free vulnerability. Successful exploitation could lead to arbitrary code execution.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Adobe Acrobat Pro DC | ||
Adobe Acrobat Dc | >=15.006.30060<=15.006.30495 | |
Adobe Acrobat Dc | >=15.008.20082<=19.010.20100 | |
Adobe Acrobat Dc | >=17.011.30056<=17.011.30140 | |
Adobe Acrobat Reader DC | >=15.006.30060<=15.006.30493 | |
Adobe Acrobat Reader DC | >=15.008.20082<=19.010.20099 | |
Adobe Acrobat Reader DC | >=17.011.30059<=17.011.30138 | |
Apple Mac OS X | ||
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2019-7759.
The title of this vulnerability is 'Adobe Acrobat Pro DC AcroForm XFA Parsing Use-After-Free Remote Code Execution Vulnerability'.
The severity of CVE-2019-7759 is critical with a CVSS score of 8.8.
An attacker can exploit CVE-2019-7759 by tricking a user into visiting a malicious page or opening a malicious file.
Yes, you can find references for CVE-2019-7759 at the following links: [SecurityFocus](http://www.securityfocus.com/bid/108320), [Adobe Security Bulletin](https://helpx.adobe.com/security/products/acrobat/apsb19-18.html), and [Zero Day Initiative](https://www.zerodayinitiative.com/advisories/ZDI-19-483/).