Adobe.Reader.PDF.JavaScript.custom.setter.Use.After.Free
Description
This indicates an attack attempt to exploit an Use After Free Vulnerability in Adobe Acrobat and Reader.
The vulnerability is due to an error when the vulnerable software handles a maliciously crafted PDF file. A remote attacker may be able to exploit this to execute arbitrary code, via a crafted PDF file.
Affected Products
Adobe Acrobat DC Continuous 2017.011.30078 for Windows and Macintosh
Adobe Acrobat Reader DC Continuous 2017.011.30078 for Windows and Macintosh
Adobe Acrobat DC Classic 2015.006.30403 for Windows and Macintosh
Adobe Acrobat Reader DC Classic 2015.006.30403 for Windows and Macintosh
Adobe Acrobat DC Continuous 2017.011.30080 for Windows and Macintosh
Adobe Acrobat Reader DC Continuous 2017.011.30080 for Windows and Macintosh
Adobe Acrobat DC Classic 2015.006.30418 for Windows and Macintosh
Adobe Acrobat Reader DC Classic 2015.006.30418 for Windows and Macintosh
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor.
https://helpx.adobe.com/security/products/acrobat/apsb18-09.html
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |
Version Updates
Date | Version | Detail |
---|---|---|
2019-06-06 | 14.627 | Severity:high:critical |