First published: Thu May 02 2024(Updated: )
Acrobat Reader versions 20.005.30539, 23.008.20470 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Any of | ||
Adobe Acrobat Reader | >=20.001.30002<20.005.30574 | |
Adobe Acrobat | >=15.007.20033<23.008.20533 | |
Adobe Acrobat Reader | >=20.001.30002<20.005.30574 | |
Adobe Acrobat Reader | >=15.007.20033<23.008.20533 | |
Any of | ||
Apple macOS | ||
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-30303 has a high severity rating due to its potential for arbitrary code execution.
To fix CVE-2024-30303, update Adobe Acrobat Reader or Acrobat DC to the latest version as recommended by Adobe.
Versions 20.005.30539, 23.008.20470 and earlier of Adobe Acrobat Reader and Acrobat DC are affected by CVE-2024-30303.
CVE-2024-30303 requires user interaction to exploit, as it necessitates opening a malicious document.
A Use After Free vulnerability in CVE-2024-30303 allows attackers to execute arbitrary code by manipulating memory after it has been freed.