Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-rxcq-r82r-9c47

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a stack overflow vulnerability due to insecure handling of a crafted PDF file, potentially resulting in memory corruption in the context of the current user. Exploitation requires user interaction in that a victim must open a crafted PDF file in Acrobat Reader.

Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a stack overflow vulnerability due to insecure handling of a crafted PDF file, potentially resulting in memory corruption in the context of the current user. Exploitation requires user interaction in that a victim must open a crafted PDF file in Acrobat Reader.

EPSS

Процентиль: 77%
0.01021
Низкий

Дефекты

CWE-787

Связанные уязвимости

CVSS3: 6.1
nvd
больше 4 лет назад

Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a stack overflow vulnerability due to insecure handling of a crafted PDF file, potentially resulting in memory corruption in the context of the current user. Exploitation requires user interaction in that a victim must open a crafted PDF file in Acrobat Reader.

CVSS3: 8.8
fstec
больше 4 лет назад

Уязвимость программ просмотра PDF-файлов Adobe Reader Document Cloud, Adobe Reader и программ редактирования PDF-файлов Adobe Acrobat Document Cloud, Adobe Acrobat, связанная с переполнением буфера в стеке, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 77%
0.01021
Низкий

Дефекты

CWE-787