First published: Thu Aug 10 2023(Updated: )
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by a Use-After-Free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Credit: psirt@adobe.com psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Adobe Acrobat Dc | >=15.008.20082<23.003.20269 | |
Adobe Acrobat Reader DC | >=15.008.20082<23.003.20269 | |
Apple macOS | ||
Microsoft Windows | ||
Adobe Acrobat Reader | >=20.001.30005<=20.005.30516.10516 | |
Adobe Acrobat Reader | >=20.001.30005<20.005.30516.10516 | |
Adobe Acrobat Reader | >=20.001.30005<20.005.30514.10514 | |
Adobe Acrobat Reader | >=20.001.30005<20.005.30514.10514 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Adobe Acrobat Reader vulnerability is CVE-2023-38243.
The severity rating of CVE-2023-38243 is medium (5.5).
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by CVE-2023-38243.
CVE-2023-38243 could lead to disclosure of sensitive memory and bypass mitigations such as ASLR.
No, Apple macOS and Microsoft Windows are not affected by CVE-2023-38243.
To fix CVE-2023-38243, update Adobe Acrobat Reader to versions 23.003.20269 (or later) or 20.005.30516 (or later).
You can find more information about CVE-2023-38243 at the following reference link: [Adobe Security Bulletin APSB23-30](https://helpx.adobe.com/security/products/acrobat/apsb23-30.html).