First published: Thu Sep 05 2024(Updated: )
Acrobat Reader versions 20.005.30636, 24.002.20964, 24.001.30123, 24.002.20991 and earlier are affected by a Use After Free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Any of | ||
Adobe Acrobat Reader | >=20.001.30005<20.005.30655 | |
Adobe Acrobat Reader | >=24.001.20604<24.001.30159 | |
Adobe Acrobat | >=15.007.20033<24.002.21005 | |
Adobe Acrobat Reader | >=20.001.30005<20.005.30655 | |
Adobe Acrobat Reader | >=15.007.20033<24.002.21005 | |
Any of | ||
Apple iOS and macOS | ||
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-45107 is classified as a critical vulnerability due to its potential to lead to sensitive memory disclosure.
To fix CVE-2024-45107, update Adobe Acrobat Reader to a version later than 20.005.30655 or 24.001.30159.
CVE-2024-45107 affects Acrobat Reader versions 20.005.30636, 24.002.20964, 24.001.30123, and 24.002.20991 and earlier.
A Use After Free vulnerability, like CVE-2024-45107, allows attackers to exploit memory that has already been freed, potentially leading to memory corruption.
Yes, exploitation of CVE-2024-45107 could allow attackers to bypass security mitigations such as Address Space Layout Randomization (ASLR).