First published: Wed Aug 14 2024(Updated: )
Acrobat Reader versions 20.005.30636, 24.002.20965, 24.002.20964, 24.001.30123 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Any of | ||
Adobe Acrobat Reader | >=20.001.30005<20.005.30655 | |
Adobe Acrobat Reader | >=24.001.20604<24.001.30159 | |
Adobe Acrobat | >=15.008.20082<24.002.21005 | |
Adobe Acrobat Reader | >=20.001.3005<20.005.30655 | |
Adobe Acrobat Reader | >=15.008.20082<24.002.21005 | |
Any of | ||
Apple macOS | ||
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-41834 is considered a high-severity vulnerability due to its potential to disclose sensitive memory.
To fix CVE-2024-41834, update Adobe Acrobat Reader or Acrobat DC to the latest version released by Adobe.
CVE-2024-41834 affects Adobe Acrobat Reader and Acrobat DC versions 20.005.30636, 24.002.20965, and earlier.
Yes, exploitation of CVE-2024-41834 could allow attackers to bypass memory protection mechanisms, including ASLR.
CVE-2024-41834 is primarily related to vulnerabilities in Adobe software and is not limited to a specific operating system.