Adobe.Reader.newWrStreamToCosObj.Handling.Use.After.Free
Description
This indicates an attack attempt to exploit a Use After Free vulnerability in Adobe Reader and Acrobat.
The vulnerability is due to an error when the vulnerable software handles a maliciously crafted PDF file. A remote attacker may be able to exploit this to execute arbitrary code within the context of the application, via a crafted PDF file.
Affected Products
Acrobat DC Continuous for Windows 2018.011.20040 and earlier versions
Acrobat DC Continuous for Macintosh 2018.011.20040 and earlier versions
Acrobat Reader DC 2 Continuous for Windows 2018.011.20040 and earlier versions
Acrobat Reader DC 2 Continuous for Macintosh 2018.011.20040 and earlier versions
Acrobat 2017 Classic for Windows 2017 2017.011.30080 and earlier versions
Acrobat 2017 Classic for Macintosh 2017 2017.011.30080 and earlier versions
Acrobat Reader 2017 Classic for Windows 2017 2017.011.30080 and earlier versions
Acrobat Reader 2017 Classic for Macintosh 2017 2017.011.30080 and earlier versions
Acrobat DC Classic 2015 for Windows 2015.006.30418 and earlier versions
Acrobat DC Classic 2015 for Macintosh 2015.006.30418 and earlier versions
Acrobat Reader DC Classic 2015 for Windows 2015.006.30418 and earlier versions
Acrobat Reader DC Classic 2015 for Macintosh 2015.006.30418 and earlier versions
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor.
https://helpx.adobe.com/security/products/acrobat/apsb18-21.html
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |
Version Updates
Date | Version | Detail |
---|---|---|
2019-06-06 | 14.627 | Severity:high:critical |