First published: Wed May 11 2022(Updated: )
Acrobat Reader DC versions 20.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by a use-after-free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Adobe Acrobat Reader DC | >=15.008.20082<=22.001.20085 | |
Adobe Acrobat Reader | >=15.008.20082<=22.001.20085 | |
macOS | ||
Microsoft Windows Operating System | ||
Adobe Acrobat Reader | >=17.011.30059<=17.012.30205 | |
Adobe Acrobat Reader Notification Manager | >=17.011.30059<=17.012.30205 | |
Adobe Acrobat Reader | >=20.001.30005<=20.005.30314 | |
Adobe Acrobat Reader Notification Manager | >=20.001.30005<=20.005.30314 | |
Adobe Acrobat Reader | >=20.001.30005<=20.005.30311 | |
Adobe Acrobat Reader Notification Manager | >=20.001.30005<=20.005.30311 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-24103 is considered a critical vulnerability that can lead to arbitrary code execution.
To mitigate CVE-2022-24103, users should update Adobe Acrobat Reader DC to the latest version.
CVE-2022-24103 affects Adobe Acrobat Reader DC versions 20.001.20085 and earlier, 20.005.3031x and earlier, and 17.012.30205 and earlier.
Yes, CVE-2022-24103 can potentially allow an attacker to execute arbitrary code in the context of the current user, leading to system compromise.
A use-after-free vulnerability like CVE-2022-24103 occurs when a program continues to use a pointer after the memory it points to has been freed, allowing exploitation.