First published: Wed Dec 18 2024(Updated: )
Acrobat Reader DC version 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by a use-after-free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Adobe Acrobat DC | <22.001.20085 | |
Adobe Acrobat Reader | <20.005.3031x | |
Adobe Acrobat Reader | <17.012.30205 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-44519 has a high severity rating due to its potential to leak sensitive memory information.
To fix CVE-2022-44519, update Adobe Acrobat Reader DC to version 22.001.20086 or later, and similarly for older versions as specified by Adobe.
CVE-2022-44519 impacts Adobe Acrobat Reader DC versions up to 22.001.20085, 20.005.3031x, and 17.012.30205 and earlier.
Yes, CVE-2022-44519 can potentially be exploited remotely if an attacker can trick a user into opening a malicious PDF file.
CVE-2022-44519 is a use-after-free vulnerability, which occurs when the software continues to reference memory after it has been freed.