First published: Fri Jan 14 2022(Updated: )
Acrobat Reader DC version 21.007.20099 (and earlier), 20.004.30017 (and earlier) and 17.011.30204 (and earlier) are affected by an Access of Memory Location After End of Buffer vulnerability that could lead to application denial-of-service. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Adobe Acrobat | >=15.008.20082<=21.007.20099 | |
Adobe Acrobat Reader | >=15.008.20082<=21.007.20099 | |
Microsoft Windows | ||
Adobe Acrobat Reader | >=17.011.30059<=17.011.30204 | |
Adobe Acrobat Reader | >=20.001.30005<=20.004.30017 | |
Adobe Acrobat Reader | >=17.011.30059<=17.011.30204 | |
Adobe Acrobat Reader | >=20.001.30005<=20.004.30017 | |
Apple iOS and macOS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-44712 is classified as a high severity vulnerability that can lead to application denial-of-service.
To fix CVE-2021-44712, update Adobe Acrobat Reader DC to the latest version available beyond 21.007.20099.
CVE-2021-44712 affects Adobe Acrobat Reader DC versions 21.007.20099 and earlier, versions 20.004.30017 and earlier, and versions of Adobe Acrobat from 17.011.30059 to 17.011.30204.
CVE-2021-44712 primarily affects Adobe Acrobat software and does not directly affect operating systems like Windows or macOS.
CVE-2021-44712 is characterized as an Access of Memory Location After End of Buffer vulnerability.