First published: Thu May 16 2024(Updated: )
Illustrator versions 28.4, 27.9.3 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Any of | ||
Adobe Illustrator | <27.9.4 | |
Adobe Illustrator | >=28.0<28.5 | |
Any of | ||
Apple macOS | ||
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-20791 has been classified with a high severity due to its potential for code execution through an out-of-bounds read.
To fix CVE-2024-20791, upgrade Adobe Illustrator to version 27.9.4 or later, or to any version above 28.5.
CVE-2024-20791 affects Illustrator versions 28.4, 27.9.3, and earlier versions.
Yes, CVE-2024-20791 can be exploited remotely if a user opens a maliciously crafted file.
CVE-2024-20791 affects Adobe Illustrator on both Windows and macOS platforms.