Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-x8vq-jv88-c5cc

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Race condition in the MoveFileEx call hook feature in Adobe Reader and Acrobat 11.x before 11.0.09 on Windows allows attackers to bypass a sandbox protection mechanism, and consequently write to files in arbitrary locations, via an NTFS junction attack, a similar issue to CVE-2014-0568.

Race condition in the MoveFileEx call hook feature in Adobe Reader and Acrobat 11.x before 11.0.09 on Windows allows attackers to bypass a sandbox protection mechanism, and consequently write to files in arbitrary locations, via an NTFS junction attack, a similar issue to CVE-2014-0568.

EPSS

Процентиль: 82%
0.01664
Низкий

Дефекты

CWE-362

Связанные уязвимости

nvd
около 11 лет назад

Race condition in the MoveFileEx call hook feature in Adobe Reader and Acrobat 11.x before 11.0.09 on Windows allows attackers to bypass a sandbox protection mechanism, and consequently write to files in arbitrary locations, via an NTFS junction attack, a similar issue to CVE-2014-0568.

EPSS

Процентиль: 82%
0.01664
Низкий

Дефекты

CWE-362