First published: Wed Aug 14 2024(Updated: )
Acrobat Reader versions 20.005.30636, 24.002.20965, 24.002.20964, 24.001.30123 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Any of | ||
Adobe Acrobat Reader | >=20.001.30005<20.005.30655 | |
Adobe Acrobat Reader | >=24.001.20604<24.001.30159 | |
Adobe Acrobat Reader | >=15.008.20082<24.002.21005 | |
Adobe Acrobat Reader Notification Manager | >=20.001.3005<20.005.30655 | |
Adobe Acrobat Reader Notification Manager | >=15.008.20082<24.002.21005 | |
Any of | ||
Apple iOS and macOS | ||
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-41830 has a critical severity rating due to its potential for arbitrary code execution.
To fix CVE-2024-41830, you should update Adobe Acrobat Reader to the latest version that is not affected by this vulnerability.
CVE-2024-41830 affects Adobe Acrobat Reader versions 20.005.30636, 24.002.20965, 24.002.20964, 24.001.30123 and earlier.
A Use After Free vulnerability in CVE-2024-41830 allows an attacker to execute arbitrary code in the context of the current user after freeing memory that is still in use.
Yes, exploitation of CVE-2024-41830 requires user interaction to execute malicious code.