First published: Thu May 02 2024(Updated: )
Acrobat Reader versions 20.005.30539, 23.008.20470 and earlier are affected by a Use After Free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Any of | ||
Adobe Acrobat Reader | >=20.001.30002<20.005.30574 | |
Adobe Acrobat | >=15.007.20033<23.008.20533 | |
Adobe Acrobat Reader | >=20.001.30002<20.005.30574 | |
Adobe Acrobat Reader | >=15.007.20033<23.008.20533 | |
Any of | ||
Apple iOS and macOS | ||
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-30302 is classified as a critical vulnerability due to its potential for sensitive memory disclosure.
To address CVE-2024-30302, users should update Adobe Acrobat Reader and Acrobat DC to the latest versions provided by Adobe.
Adobe Acrobat Reader versions up to 20.005.30539 and Acrobat DC versions up to 23.008.20470 are impacted by CVE-2024-30302.
CVE-2024-30302 is a Use After Free vulnerability that can lead to sensitive information exposure.
Exploitation of CVE-2024-30302 requires user interaction, meaning an attacker must trick the user into opening a malicious PDF file.