First published: Thu Feb 29 2024(Updated: )
Acrobat Reader versions 20.005.30539, 23.008.20470 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Adobe Acrobat Reader | <23.008.20470 | |
All of | ||
Any of | ||
Adobe Acrobat Reader | >=20.001.3005<20.005.30574 | |
Adobe Acrobat | >=15.007.20033<23.008.20533 | |
Adobe Acrobat Reader | >=20.001.3005<20.005.30574 | |
Adobe Acrobat Reader | >=15.007.20033<23.008.20533 | |
Any of | ||
Apple iOS and macOS | ||
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-20765 is classified as a critical vulnerability due to its potential for arbitrary code execution.
To address CVE-2024-20765, update Adobe Acrobat Reader to version 20.005.30574 or 23.008.20533 or later.
CVE-2024-20765 affects Adobe Acrobat Reader and Adobe Acrobat DC across various operating systems including both Windows and macOS.
A Use After Free vulnerability, such as CVE-2024-20765, occurs when a program continues to use a pointer after the memory it points to has been freed, potentially allowing for exploitation.
Exploitation of CVE-2024-20765 requires user interaction, specifically that a victim must open a malicious PDF file.