First published: Fri Sep 13 2024(Updated: )
Acrobat Reader versions 24.002.21005, 24.001.30159, 20.005.30655, 24.003.20054 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Any of | ||
Adobe Acrobat Reader | <20.005.30680 | |
Adobe Acrobat Reader | >=24.001.0<24.001.30187 | |
Adobe Acrobat | >=24.003.0<24.003.20112 | |
Adobe Acrobat Reader | <20.005.30680 | |
Adobe Acrobat Reader | >=24.003.0<24.003.20112 | |
Any of | ||
Apple iOS and macOS | ||
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-41869 has a high severity level due to its potential for arbitrary code execution.
To fix CVE-2024-41869, update Adobe Acrobat Reader to the latest version as recommended by Adobe.
CVE-2024-41869 affects Adobe Acrobat Reader versions 24.002.21005, 24.001.30159, 20.005.30655, and 24.003.20054, and earlier.
A Use After Free vulnerability like CVE-2024-41869 occurs when the program continues to use a memory reference after it has been freed, potentially leading to arbitrary code execution.
Exploitation of CVE-2024-41869 requires user interaction, meaning the user must open a specifically crafted file that triggers the vulnerability.