First published: Wed Dec 13 2023(Updated: )
Adobe Illustrator versions 28.0 (and earlier) and 27.9 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Any of | ||
Adobe Illustrator CC | >=27.0<=27.9 | |
Adobe Illustrator CC | =28.0 | |
Any of | ||
Apple macOS | ||
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-47074 is classified as a critical vulnerability due to its potential to allow remote code execution.
To fix CVE-2023-47074, update Adobe Illustrator to version 28.1 or later.
Adobe Illustrator versions 27.0 and earlier, as well as version 28.0, are affected by CVE-2023-47074.
Yes, CVE-2023-47074 can be exploited remotely by an attacker using a crafted file.
CVE-2023-47074 is an out-of-bounds read vulnerability that occurs when parsing specially crafted files.