First published: Wed Aug 14 2024(Updated: )
Acrobat Reader versions 20.005.30636, 24.002.20965, 24.002.20964, 24.001.30123 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Any of | ||
Adobe Acrobat Reader | >=20.001.3005<20.005.30655 | |
Adobe Acrobat Reader | >=24.001.20604<24.001.30159 | |
Adobe Acrobat Reader DC | >=24.002.20964<24.002.21005 | |
Adobe Acrobat Reader Notification Manager | >=20.001.3005<20.005.30655 | |
Adobe Acrobat Reader | >=24.002.20964<24.002.21005 | |
Any of | ||
macOS | ||
Microsoft Windows Operating System |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-39383 is classified as a critical vulnerability due to its potential for arbitrary code execution.
To fix CVE-2024-39383, update Adobe Acrobat Reader or Acrobat DC to the latest version provided by Adobe.
CVE-2024-39383 affects Adobe Acrobat Reader versions up to 20.005.30636 and 24.002.20964 and earlier.
CVE-2024-39383 is a Use After Free vulnerability that can lead to arbitrary code execution.
Yes, exploiting CVE-2024-39383 requires user interaction to trigger the vulnerability.