Adobe.Reader.JSON.Stringify.Use.After.Free
Description
This indicates an attack attempt to exploit a Use After Free Vulnerability in Adobe Acrobat and Reader.
The vulnerability is due to an error when the vulnerable software handles a maliciously crafted PDF file. A remote attacker may be able to exploit this to execute arbitrary code within the context of the application, via a crafted PDF file.
Affected Products
Adobe Acrobat DC Continuous 2018.011.20038 and earlier versions for Windows and macOS
Adobe Acrobat Reader DC Continuous 2018.011.20038 and earlier versions for Windows and macOS
Acrobat 2017 Classic 2017 2017.011.30079 and earlier versions for Windows and macOS
Acrobat Reader 2017 Classic 2017 2017.011.30079 and earlier versions for Windows and macOS
Acrobat DC Classic 2015 2015.006.30417 and earlier versions for Windows and macOS
Acrobat Reader DC Classic 2015 2015.006.30417 and earlier versions for Windows and macOS
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor.
https://helpx.adobe.com/security/products/acrobat/apsb18-09.html
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |