Adobe.Reader.JavaScript.Object.Evaluation.Use.After.Free
Description
This indicates an attack attempt to exploit a Memory Corruption vulnerability in Adobe Acrobat and Reader.
The vulnerability is due to an error when the vulnerable software handles a maliciously crafted PDF file. A remote attacker may be able to exploit this to execute arbitrary code within the context of the application, via a crafted PDF file.
Affected Products
Acrobat DC (Continuous Track) 2017.012.20098 and earlier versions on Windows and Macintosh
Acrobat Reader DC (Continuous Track) 2017.012.20098 and earlier versions on Windows and Macintosh
Acrobat 2017 2017.011.30066 and earlier versions on Windows and Macintosh
Acrobat Reader 2017 2017.011.30066 and earlier versions on Windows and Macintosh
Acrobat DC (Classic Track) 2015.006.30355 and earlier versions on Windows and Macintosh
Acrobat Reader DC (Classic Track) 2015.006.30355 and earlier versions on Windows and Macintosh
Acrobat XI 11.0.22 and earlier versions on Windows and Macintosh
Reader XI 11.0.22 and earlier versions on Windows and Macintosh
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor.
https://helpx.adobe.com/security/products/acrobat/apsb17-36.html
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |