First published: Wed May 15 2024(Updated: )
Acrobat Reader versions 20.005.30574, 24.002.20736 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Any of | ||
Adobe Acrobat | >=15.007.20033<24.002.20759 | |
Adobe Acrobat Reader | >=15.007.20033<24.002.20759 | |
Any of | ||
Apple macOS | ||
Microsoft Windows | ||
All of | ||
Any of | ||
Adobe Acrobat Reader | >=20.001.30002<20.005.30635 | |
Adobe Acrobat Reader | >=20.001.30002<20.005.30635 | |
Apple macOS | ||
All of | ||
Any of | ||
Adobe Acrobat Reader | >=20.001.30002<20.005.30636 | |
Adobe Acrobat Reader | >=20.001.30002<20.005.30636 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-34097 is high due to the potential for arbitrary code execution.
To fix CVE-2024-34097, update Adobe Acrobat and Adobe Acrobat Reader to the latest versions provided by Adobe.
CVE-2024-34097 affects Adobe Acrobat versions up to 20.005.30635 and Adobe Reader versions up to 20.005.30635.
Yes, exploitation of CVE-2024-34097 requires user interaction, as a victim must open a malicious file.
CVE-2024-34097 is classified as a Use After Free vulnerability.