First published: Wed Aug 14 2024(Updated: )
Acrobat Reader versions 20.005.30636, 24.002.20965, 24.002.20964, 24.001.30123 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Any of | ||
Adobe Acrobat Reader | >=20.001.30005<20.005.30655 | |
Adobe Acrobat Reader | >=24.001.20604<24.001.30159 | |
Adobe Acrobat | >=15.008.20082<24.002.21005 | |
Adobe Acrobat Reader | >=20.001.3005<20.005.30655 | |
Adobe Acrobat Reader | >=15.008.20082<24.002.21005 | |
Any of | ||
Apple iOS and macOS | ||
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-41835 has been classified as a critical vulnerability due to its potential to disclose sensitive memory information.
To fix CVE-2024-41835, update Adobe Acrobat Reader or Adobe Acrobat DC to the latest version provided by Adobe.
CVE-2024-41835 affects Adobe Acrobat Reader versions 20.005.30636 and earlier, as well as various versions of Adobe Acrobat DC up to 24.002.21005.
CVE-2024-41835 can be exploited by attackers to bypass memory protection mitigations such as ASLR.
There are no effective workarounds for CVE-2024-41835; the best mitigation is to apply the recommended updates.