First published: Thu Nov 05 2020(Updated: )
Acrobat Reader versions 2020.012.20048 (and earlier), 2020.001.30005 (and earlier) and 2017.011.30175 (and earlier) are affected by an input validation vulnerability when decoding a crafted codec that could result in the disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Adobe Acrobat Reader | <=20.001.30005 | |
Adobe Acrobat | <=17.011.30175 | |
Adobe Acrobat | <=20.012.20048 | |
Adobe Acrobat Reader | <=20.001.30005 | |
Adobe Acrobat Reader | <=17.011.30175 | |
Adobe Acrobat Reader | <=20.012.20048 | |
Apple iOS and macOS | ||
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-24427 has been rated as a critical severity vulnerability due to its potential to disclose sensitive information.
To fix CVE-2020-24427, update your Adobe Acrobat Reader or Adobe Acrobat DC to the latest version as recommended by Adobe.
CVE-2020-24427 affects Adobe Acrobat Reader versions 20.001.30005 and earlier, Adobe Acrobat DC versions 20.012.20048 and earlier, and 2017.011.30175 and earlier.
CVE-2020-24427 could allow an attacker to potentially disclose sensitive memory information to unauthorized users.
CVE-2020-24427 may require user interaction for exploitation, but it can lead to remote disclosure of sensitive information.