First published: Wed Sep 06 2023(Updated: )
Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a Use After Free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Credit: psirt@adobe.com psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Adobe Acrobat Dc | >=15.007.20033<=21.005.20060 | |
Adobe Acrobat Reader DC | >=15.007.20033<=21.005.20060 | |
Microsoft Windows | ||
Adobe Acrobat Dc | >=15.007.20033<=21.005.20058 | |
Adobe Acrobat Reader DC | >=15.007.20033<=21.005.20058 | |
Apple macOS | ||
Adobe Acrobat Reader | >=17.011.30180<17.011.30202 | |
Adobe Acrobat Reader | >=20.001.30005<20.004.30015 | |
Adobe Acrobat Reader | >=17.011.30180<17.011.30202 | |
Adobe Acrobat Reader | >=20.001.30005<20.004.30015 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2021-39859.
Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by this vulnerability.
The severity of CVE-2021-39859 is medium with a severity value of 5.5.
An attacker can leverage this vulnerability to bypass mitigations such as ASLR and potentially disclose sensitive memory.
You can find more information about this vulnerability at the following link: https://helpx.adobe.com/security/products/acrobat/apsb21-55.html