First published: Tue Nov 03 2020(Updated: )
Acrobat Reader DC versions 2020.012.20048 (and earlier), 2020.001.30005 (and earlier) and 2017.011.30175 (and earlier) are affected by a use-after-free vulnerability when handling malicious JavaScript. This vulnerability could result in arbitrary code execution in the context of the current user. Exploitation requires user interaction in that a victim must open a malicious file.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Adobe Acrobat Reader | <=20.001.30005 | |
Adobe Acrobat | <=17.011.30175 | |
Adobe Acrobat | <=20.012.20048 | |
Adobe Acrobat Reader | <=20.001.30005 | |
Adobe Acrobat Reader | <=17.011.30175 | |
Adobe Acrobat Reader | <=20.012.20048 | |
Apple iOS and macOS | ||
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-24430 is classified as a critical vulnerability that could lead to arbitrary code execution.
To fix CVE-2020-24430, you should update Adobe Acrobat and Acrobat Reader DC to the latest version.
CVE-2020-24430 affects Adobe Acrobat Reader DC versions up to 20.001.30005 and Adobe Acrobat DC versions up to 20.012.20048.
A use-after-free vulnerability, as seen in CVE-2020-24430, allows attackers to execute arbitrary code by exploiting a flaw in memory management.
CVE-2020-24430 is not specific to any operating system as it affects Adobe products on multiple platforms.