New Search

Multiple vulnerabilities on Acrobat DC and Acrobat Reader DC version 21.007.20095 (and earlier) Acrobat 2020 and Acrobat Reader 2020 version 20.004.30015 (and earlier) Acrobat 2017 and Acrobat Reader 2017 version 17.011.30202 (and earlier)

oval:org.cisecurity:def:9023

Adobe Acrobat Reader DC version 21.007.20095 (and earlier) 21.007.20096 (and earlier) 20.004.30015 (and earlier) and 17.011.30202 (and earlier) is affected by a use-after-free that allow a remote attacker to disclose sensitive information on affected installations of of Adobe Acrobat Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JPG2000 images. (CVE-2021-40730) Adobe Acrobat Reader DC version 21.007.20095 (and earlier) 21.007.20096 (and earlier) 20.004.30015 (and earlier) and 17.011.30202 (and earlier) is affected by an out-of-bounds write vulnerability when parsing a crafted JPEG2000 file which could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. (CVE-2021-40731) Adobe Acrobat Reader DC version 21.007.20095 (and earlier) 21.007.20096 (and earlier) 20.004.30015 (and earlier) and 17.011.30202 (and earlier) is affected by a use-after-free vulnerability in the processing of the GetURL function on a global object window that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. (CVE-2021-40728) Adobe Acrobat Reader DC version 21.007.20095 (and earlier) 21.007.20096 (and earlier) 20.004.30015 (and earlier) and 17.011.30202 (and earlier) is affected by a out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious PDF file. (CVE-2021-40729)

Family:
windows
Status:
ACCEPTED
Platform(s):
  • Microsoft Windows Server 2008
  • Microsoft Windows Server 2012
  • Microsoft Windows 8.1
  • Microsoft Windows 7
  • Microsoft Windows 8
  • Microsoft Windows 10
  • Microsoft Windows Server 2003
  • Microsoft Windows Server 2008 R2
  • Microsoft Windows Server 2012 R2
Class:
vulnerability
Reference(s):
  • APSB21-104
  • CVE-2021-40730
  • CVE-2021-40731
  • CVE-2021-40728
  • CVE-2021-40729
Product(s):
  • Adobe Acrobat 2017
  • Adobe Reader DC Continuous
  • Adobe Acrobat 2020
  • Adobe Reader 2020
  • Adobe Acrobat DC Continuous
  • Adobe Reader 2017