First published: Thu Feb 15 2024(Updated: )
Acrobat Reader versions 20.005.30539, 23.008.20470 and earlier are affected by a Use After Free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Any of | ||
Adobe Acrobat | >=15.008.20082<23.008.20533 | |
Adobe Acrobat Reader | >=15.008.20082<23.008.20533 | |
Any of | ||
Apple macOS | ||
Microsoft Windows | ||
All of | ||
Any of | ||
Adobe Acrobat Reader | >=20.001.30005<20.005.30574 | |
Adobe Acrobat Reader | >=20.001.30005<20.005.30574 | |
Any of | ||
Apple macOS | ||
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-20734 is classified as a critical severity vulnerability that may lead to the disclosure of sensitive information.
To mitigate CVE-2024-20734, users should upgrade to the latest version of Adobe Acrobat Reader or Acrobat DC.
CVE-2024-20734 is a Use After Free vulnerability that can potentially allow attackers to obtain sensitive information.
CVE-2024-20734 affects Adobe Acrobat Reader versions up to 20.005.30574 and 23.008.20470 and earlier versions.
Exploitation of CVE-2024-20734 typically requires user interaction, such as opening a malicious PDF file.