Action not permitted
Modal body text goes here.
Modal Title
Modal Body
wid-sec-w-2023-2010
Vulnerability from csaf_certbund
Published
2023-08-08 22:00
Modified
2023-08-10 22:00
Summary
Adobe Acrobat und Acrobat Reader: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Adobe Acrobat ist ein Programm für die Erstellung und Betrachtung von Dokumenten im Portable Document Format (PDF).
Acrobat Reader ist ein Programm für die Anzeige von Dokumenten im Portable Document Format (PDF).
Adobe Reader ist ein Programm für die Anzeige von Dokumenten im Portable Document Format (PDF).
Angriff
Ein Angreifer kann mehrere Schwachstellen in Adobe Acrobat DC, Adobe Acrobat Reader DC, Adobe Acrobat und Adobe Acrobat Reader ausnutzen, um Sicherheitsvorkehrungen zu umgehen, einen Denial of Service zu verursachen, Informationen offenzulegen oder Code auszuführen.
Betroffene Betriebssysteme
- MacOS X
- Windows
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Adobe Acrobat ist ein Programm f\u00fcr die Erstellung und Betrachtung von Dokumenten im Portable Document Format (PDF).\r\nAcrobat Reader ist ein Programm f\u00fcr die Anzeige von Dokumenten im Portable Document Format (PDF).\r\nAdobe Reader ist ein Programm f\u00fcr die Anzeige von Dokumenten im Portable Document Format (PDF).", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in Adobe Acrobat DC, Adobe Acrobat Reader DC, Adobe Acrobat und Adobe Acrobat Reader ausnutzen, um Sicherheitsvorkehrungen zu umgehen, einen Denial of Service zu verursachen, Informationen offenzulegen oder Code auszuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- MacOS X\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-2010 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-2010.json" }, { "category": "self", "summary": "WID-SEC-2023-2010 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2010" }, { "category": "external", "summary": "Adobe Security Bulletin vom 2023-08-08", "url": "https://helpx.adobe.com/security/products/acrobat/apsb23-30.html" } ], "source_lang": "en-US", "title": "Adobe Acrobat und Acrobat Reader: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-08-10T22:00:00.000+00:00", "generator": { "date": "2024-08-15T17:56:48.759+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2023-2010", "initial_release_date": "2023-08-08T22:00:00.000+00:00", "revision_history": [ { "date": "2023-08-08T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2023-08-10T22:00:00.000+00:00", "number": "2", "summary": "Anpassung" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Adobe Acrobat \u003c 2020 Mac 20.005.30516.10516", "product": { "name": "Adobe Acrobat \u003c 2020 Mac 20.005.30516.10516", "product_id": "T029154", "product_identification_helper": { "cpe": "cpe:/a:adobe:acrobat:2020_mac_20.005.30516.10516" } } }, { "category": "product_name", "name": "Adobe Acrobat \u003c 2020 Win 20.005.30514.10514", "product": { "name": "Adobe Acrobat \u003c 2020 Win 20.005.30514.10514", "product_id": "T029155", "product_identification_helper": { "cpe": "cpe:/a:adobe:acrobat:2020_win_20.005.30514.10514" } } } ], "category": "product_name", "name": "Acrobat" }, { "category": "product_name", "name": "Adobe Acrobat DC \u003c 23.003.20269", "product": { "name": "Adobe Acrobat DC \u003c 23.003.20269", "product_id": "T029151", "product_identification_helper": { "cpe": "cpe:/a:adobe:acrobat_dc:23.003.20269" } } }, { "branches": [ { "category": "product_name", "name": "Adobe Acrobat Reader \u003c 2020 Mac 20.005.30516.10516", "product": { "name": "Adobe Acrobat Reader \u003c 2020 Mac 20.005.30516.10516", "product_id": "T029156", "product_identification_helper": { "cpe": "cpe:/a:adobe:acrobat_reader:2020_mac_20.005.30516.10516" } } }, { "category": "product_name", "name": "Adobe Acrobat Reader \u003c 2020 Win 20.005.30514.10514", "product": { "name": "Adobe Acrobat Reader \u003c 2020 Win 20.005.30514.10514", "product_id": "T029157", "product_identification_helper": { "cpe": "cpe:/a:adobe:acrobat_reader:2020_win_20.005.30514.10514" } } } ], "category": "product_name", "name": "Acrobat Reader" }, { "category": "product_name", "name": "Adobe Acrobat Reader DC \u003c 23.003.20269", "product": { "name": "Adobe Acrobat Reader DC \u003c 23.003.20269", "product_id": "T029152", "product_identification_helper": { "cpe": "cpe:/a:adobe:acrobat_reader_dc:23.003.20269" } } } ], "category": "vendor", "name": "Adobe" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-38248", "notes": [ { "category": "description", "text": "In Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Ursachen sind ungen\u00fcgende Eingabe- und Zugriffskontrollen, Zugriff auf uninitialisierte Zeiger, Use After Free-, und Out of Bounds Read und Write Fehler. Ein Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsvorkehrungen zu umgehen, einen Denial of Service zu verursachen, Informationen offenzulegen oder Code auszuf\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Authentisierung oder eine Benutzeraktion erforderlich." } ], "release_date": "2023-08-08T22:00:00.000+00:00", "title": "CVE-2023-38248" }, { "cve": "CVE-2023-38247", "notes": [ { "category": "description", "text": "In Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Ursachen sind ungen\u00fcgende Eingabe- und Zugriffskontrollen, Zugriff auf uninitialisierte Zeiger, Use After Free-, und Out of Bounds Read und Write Fehler. Ein Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsvorkehrungen zu umgehen, einen Denial of Service zu verursachen, Informationen offenzulegen oder Code auszuf\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Authentisierung oder eine Benutzeraktion erforderlich." } ], "release_date": "2023-08-08T22:00:00.000+00:00", "title": "CVE-2023-38247" }, { "cve": "CVE-2023-38246", "notes": [ { "category": "description", "text": "In Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Ursachen sind ungen\u00fcgende Eingabe- und Zugriffskontrollen, Zugriff auf uninitialisierte Zeiger, Use After Free-, und Out of Bounds Read und Write Fehler. Ein Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsvorkehrungen zu umgehen, einen Denial of Service zu verursachen, Informationen offenzulegen oder Code auszuf\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Authentisierung oder eine Benutzeraktion erforderlich." } ], "release_date": "2023-08-08T22:00:00.000+00:00", "title": "CVE-2023-38246" }, { "cve": "CVE-2023-38245", "notes": [ { "category": "description", "text": "In Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Ursachen sind ungen\u00fcgende Eingabe- und Zugriffskontrollen, Zugriff auf uninitialisierte Zeiger, Use After Free-, und Out of Bounds Read und Write Fehler. Ein Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsvorkehrungen zu umgehen, einen Denial of Service zu verursachen, Informationen offenzulegen oder Code auszuf\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Authentisierung oder eine Benutzeraktion erforderlich." } ], "release_date": "2023-08-08T22:00:00.000+00:00", "title": "CVE-2023-38245" }, { "cve": "CVE-2023-38244", "notes": [ { "category": "description", "text": "In Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Ursachen sind ungen\u00fcgende Eingabe- und Zugriffskontrollen, Zugriff auf uninitialisierte Zeiger, Use After Free-, und Out of Bounds Read und Write Fehler. Ein Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsvorkehrungen zu umgehen, einen Denial of Service zu verursachen, Informationen offenzulegen oder Code auszuf\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Authentisierung oder eine Benutzeraktion erforderlich." } ], "release_date": "2023-08-08T22:00:00.000+00:00", "title": "CVE-2023-38244" }, { "cve": "CVE-2023-38243", "notes": [ { "category": "description", "text": "In Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Ursachen sind ungen\u00fcgende Eingabe- und Zugriffskontrollen, Zugriff auf uninitialisierte Zeiger, Use After Free-, und Out of Bounds Read und Write Fehler. Ein Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsvorkehrungen zu umgehen, einen Denial of Service zu verursachen, Informationen offenzulegen oder Code auszuf\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Authentisierung oder eine Benutzeraktion erforderlich." } ], "release_date": "2023-08-08T22:00:00.000+00:00", "title": "CVE-2023-38243" }, { "cve": "CVE-2023-38242", "notes": [ { "category": "description", "text": "In Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Ursachen sind ungen\u00fcgende Eingabe- und Zugriffskontrollen, Zugriff auf uninitialisierte Zeiger, Use After Free-, und Out of Bounds Read und Write Fehler. Ein Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsvorkehrungen zu umgehen, einen Denial of Service zu verursachen, Informationen offenzulegen oder Code auszuf\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Authentisierung oder eine Benutzeraktion erforderlich." } ], "release_date": "2023-08-08T22:00:00.000+00:00", "title": "CVE-2023-38242" }, { "cve": "CVE-2023-38241", "notes": [ { "category": "description", "text": "In Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Ursachen sind ungen\u00fcgende Eingabe- und Zugriffskontrollen, Zugriff auf uninitialisierte Zeiger, Use After Free-, und Out of Bounds Read und Write Fehler. Ein Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsvorkehrungen zu umgehen, einen Denial of Service zu verursachen, Informationen offenzulegen oder Code auszuf\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Authentisierung oder eine Benutzeraktion erforderlich." } ], "release_date": "2023-08-08T22:00:00.000+00:00", "title": "CVE-2023-38241" }, { "cve": "CVE-2023-38240", "notes": [ { "category": "description", "text": "In Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Ursachen sind ungen\u00fcgende Eingabe- und Zugriffskontrollen, Zugriff auf uninitialisierte Zeiger, Use After Free-, und Out of Bounds Read und Write Fehler. Ein Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsvorkehrungen zu umgehen, einen Denial of Service zu verursachen, Informationen offenzulegen oder Code auszuf\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Authentisierung oder eine Benutzeraktion erforderlich." } ], "release_date": "2023-08-08T22:00:00.000+00:00", "title": "CVE-2023-38240" }, { "cve": "CVE-2023-38239", "notes": [ { "category": "description", "text": "In Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Ursachen sind ungen\u00fcgende Eingabe- und Zugriffskontrollen, Zugriff auf uninitialisierte Zeiger, Use After Free-, und Out of Bounds Read und Write Fehler. Ein Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsvorkehrungen zu umgehen, einen Denial of Service zu verursachen, Informationen offenzulegen oder Code auszuf\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Authentisierung oder eine Benutzeraktion erforderlich." } ], "release_date": "2023-08-08T22:00:00.000+00:00", "title": "CVE-2023-38239" }, { "cve": "CVE-2023-38238", "notes": [ { "category": "description", "text": "In Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Ursachen sind ungen\u00fcgende Eingabe- und Zugriffskontrollen, Zugriff auf uninitialisierte Zeiger, Use After Free-, und Out of Bounds Read und Write Fehler. Ein Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsvorkehrungen zu umgehen, einen Denial of Service zu verursachen, Informationen offenzulegen oder Code auszuf\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Authentisierung oder eine Benutzeraktion erforderlich." } ], "release_date": "2023-08-08T22:00:00.000+00:00", "title": "CVE-2023-38238" }, { "cve": "CVE-2023-38237", "notes": [ { "category": "description", "text": "In Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Ursachen sind ungen\u00fcgende Eingabe- und Zugriffskontrollen, Zugriff auf uninitialisierte Zeiger, Use After Free-, und Out of Bounds Read und Write Fehler. Ein Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsvorkehrungen zu umgehen, einen Denial of Service zu verursachen, Informationen offenzulegen oder Code auszuf\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Authentisierung oder eine Benutzeraktion erforderlich." } ], "release_date": "2023-08-08T22:00:00.000+00:00", "title": "CVE-2023-38237" }, { "cve": "CVE-2023-38236", "notes": [ { "category": "description", "text": "In Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Ursachen sind ungen\u00fcgende Eingabe- und Zugriffskontrollen, Zugriff auf uninitialisierte Zeiger, Use After Free-, und Out of Bounds Read und Write Fehler. Ein Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsvorkehrungen zu umgehen, einen Denial of Service zu verursachen, Informationen offenzulegen oder Code auszuf\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Authentisierung oder eine Benutzeraktion erforderlich." } ], "release_date": "2023-08-08T22:00:00.000+00:00", "title": "CVE-2023-38236" }, { "cve": "CVE-2023-38235", "notes": [ { "category": "description", "text": "In Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Ursachen sind ungen\u00fcgende Eingabe- und Zugriffskontrollen, Zugriff auf uninitialisierte Zeiger, Use After Free-, und Out of Bounds Read und Write Fehler. Ein Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsvorkehrungen zu umgehen, einen Denial of Service zu verursachen, Informationen offenzulegen oder Code auszuf\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Authentisierung oder eine Benutzeraktion erforderlich." } ], "release_date": "2023-08-08T22:00:00.000+00:00", "title": "CVE-2023-38235" }, { "cve": "CVE-2023-38234", "notes": [ { "category": "description", "text": "In Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Ursachen sind ungen\u00fcgende Eingabe- und Zugriffskontrollen, Zugriff auf uninitialisierte Zeiger, Use After Free-, und Out of Bounds Read und Write Fehler. Ein Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsvorkehrungen zu umgehen, einen Denial of Service zu verursachen, Informationen offenzulegen oder Code auszuf\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Authentisierung oder eine Benutzeraktion erforderlich." } ], "release_date": "2023-08-08T22:00:00.000+00:00", "title": "CVE-2023-38234" }, { "cve": "CVE-2023-38233", "notes": [ { "category": "description", "text": "In Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Ursachen sind ungen\u00fcgende Eingabe- und Zugriffskontrollen, Zugriff auf uninitialisierte Zeiger, Use After Free-, und Out of Bounds Read und Write Fehler. Ein Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsvorkehrungen zu umgehen, einen Denial of Service zu verursachen, Informationen offenzulegen oder Code auszuf\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Authentisierung oder eine Benutzeraktion erforderlich." } ], "release_date": "2023-08-08T22:00:00.000+00:00", "title": "CVE-2023-38233" }, { "cve": "CVE-2023-38232", "notes": [ { "category": "description", "text": "In Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Ursachen sind ungen\u00fcgende Eingabe- und Zugriffskontrollen, Zugriff auf uninitialisierte Zeiger, Use After Free-, und Out of Bounds Read und Write Fehler. Ein Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsvorkehrungen zu umgehen, einen Denial of Service zu verursachen, Informationen offenzulegen oder Code auszuf\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Authentisierung oder eine Benutzeraktion erforderlich." } ], "release_date": "2023-08-08T22:00:00.000+00:00", "title": "CVE-2023-38232" }, { "cve": "CVE-2023-38231", "notes": [ { "category": "description", "text": "In Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Ursachen sind ungen\u00fcgende Eingabe- und Zugriffskontrollen, Zugriff auf uninitialisierte Zeiger, Use After Free-, und Out of Bounds Read und Write Fehler. Ein Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsvorkehrungen zu umgehen, einen Denial of Service zu verursachen, Informationen offenzulegen oder Code auszuf\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Authentisierung oder eine Benutzeraktion erforderlich." } ], "release_date": "2023-08-08T22:00:00.000+00:00", "title": "CVE-2023-38231" }, { "cve": "CVE-2023-38230", "notes": [ { "category": "description", "text": "In Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Ursachen sind ungen\u00fcgende Eingabe- und Zugriffskontrollen, Zugriff auf uninitialisierte Zeiger, Use After Free-, und Out of Bounds Read und Write Fehler. Ein Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsvorkehrungen zu umgehen, einen Denial of Service zu verursachen, Informationen offenzulegen oder Code auszuf\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Authentisierung oder eine Benutzeraktion erforderlich." } ], "release_date": "2023-08-08T22:00:00.000+00:00", "title": "CVE-2023-38230" }, { "cve": "CVE-2023-38229", "notes": [ { "category": "description", "text": "In Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Ursachen sind ungen\u00fcgende Eingabe- und Zugriffskontrollen, Zugriff auf uninitialisierte Zeiger, Use After Free-, und Out of Bounds Read und Write Fehler. Ein Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsvorkehrungen zu umgehen, einen Denial of Service zu verursachen, Informationen offenzulegen oder Code auszuf\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Authentisierung oder eine Benutzeraktion erforderlich." } ], "release_date": "2023-08-08T22:00:00.000+00:00", "title": "CVE-2023-38229" }, { "cve": "CVE-2023-38228", "notes": [ { "category": "description", "text": "In Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Ursachen sind ungen\u00fcgende Eingabe- und Zugriffskontrollen, Zugriff auf uninitialisierte Zeiger, Use After Free-, und Out of Bounds Read und Write Fehler. Ein Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsvorkehrungen zu umgehen, einen Denial of Service zu verursachen, Informationen offenzulegen oder Code auszuf\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Authentisierung oder eine Benutzeraktion erforderlich." } ], "release_date": "2023-08-08T22:00:00.000+00:00", "title": "CVE-2023-38228" }, { "cve": "CVE-2023-38227", "notes": [ { "category": "description", "text": "In Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Ursachen sind ungen\u00fcgende Eingabe- und Zugriffskontrollen, Zugriff auf uninitialisierte Zeiger, Use After Free-, und Out of Bounds Read und Write Fehler. Ein Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsvorkehrungen zu umgehen, einen Denial of Service zu verursachen, Informationen offenzulegen oder Code auszuf\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Authentisierung oder eine Benutzeraktion erforderlich." } ], "release_date": "2023-08-08T22:00:00.000+00:00", "title": "CVE-2023-38227" }, { "cve": "CVE-2023-38226", "notes": [ { "category": "description", "text": "In Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Ursachen sind ungen\u00fcgende Eingabe- und Zugriffskontrollen, Zugriff auf uninitialisierte Zeiger, Use After Free-, und Out of Bounds Read und Write Fehler. Ein Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsvorkehrungen zu umgehen, einen Denial of Service zu verursachen, Informationen offenzulegen oder Code auszuf\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Authentisierung oder eine Benutzeraktion erforderlich." } ], "release_date": "2023-08-08T22:00:00.000+00:00", "title": "CVE-2023-38226" }, { "cve": "CVE-2023-38225", "notes": [ { "category": "description", "text": "In Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Ursachen sind ungen\u00fcgende Eingabe- und Zugriffskontrollen, Zugriff auf uninitialisierte Zeiger, Use After Free-, und Out of Bounds Read und Write Fehler. Ein Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsvorkehrungen zu umgehen, einen Denial of Service zu verursachen, Informationen offenzulegen oder Code auszuf\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Authentisierung oder eine Benutzeraktion erforderlich." } ], "release_date": "2023-08-08T22:00:00.000+00:00", "title": "CVE-2023-38225" }, { "cve": "CVE-2023-38224", "notes": [ { "category": "description", "text": "In Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Ursachen sind ungen\u00fcgende Eingabe- und Zugriffskontrollen, Zugriff auf uninitialisierte Zeiger, Use After Free-, und Out of Bounds Read und Write Fehler. Ein Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsvorkehrungen zu umgehen, einen Denial of Service zu verursachen, Informationen offenzulegen oder Code auszuf\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Authentisierung oder eine Benutzeraktion erforderlich." } ], "release_date": "2023-08-08T22:00:00.000+00:00", "title": "CVE-2023-38224" }, { "cve": "CVE-2023-38223", "notes": [ { "category": "description", "text": "In Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Ursachen sind ungen\u00fcgende Eingabe- und Zugriffskontrollen, Zugriff auf uninitialisierte Zeiger, Use After Free-, und Out of Bounds Read und Write Fehler. Ein Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsvorkehrungen zu umgehen, einen Denial of Service zu verursachen, Informationen offenzulegen oder Code auszuf\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Authentisierung oder eine Benutzeraktion erforderlich." } ], "release_date": "2023-08-08T22:00:00.000+00:00", "title": "CVE-2023-38223" }, { "cve": "CVE-2023-38222", "notes": [ { "category": "description", "text": "In Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Ursachen sind ungen\u00fcgende Eingabe- und Zugriffskontrollen, Zugriff auf uninitialisierte Zeiger, Use After Free-, und Out of Bounds Read und Write Fehler. Ein Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsvorkehrungen zu umgehen, einen Denial of Service zu verursachen, Informationen offenzulegen oder Code auszuf\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Authentisierung oder eine Benutzeraktion erforderlich." } ], "release_date": "2023-08-08T22:00:00.000+00:00", "title": "CVE-2023-38222" }, { "cve": "CVE-2023-29320", "notes": [ { "category": "description", "text": "In Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Ursachen sind ungen\u00fcgende Eingabe- und Zugriffskontrollen, Zugriff auf uninitialisierte Zeiger, Use After Free-, und Out of Bounds Read und Write Fehler. Ein Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsvorkehrungen zu umgehen, einen Denial of Service zu verursachen, Informationen offenzulegen oder Code auszuf\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Authentisierung oder eine Benutzeraktion erforderlich." } ], "release_date": "2023-08-08T22:00:00.000+00:00", "title": "CVE-2023-29320" }, { "cve": "CVE-2023-29303", "notes": [ { "category": "description", "text": "In Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Ursachen sind ungen\u00fcgende Eingabe- und Zugriffskontrollen, Zugriff auf uninitialisierte Zeiger, Use After Free-, und Out of Bounds Read und Write Fehler. Ein Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsvorkehrungen zu umgehen, einen Denial of Service zu verursachen, Informationen offenzulegen oder Code auszuf\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Authentisierung oder eine Benutzeraktion erforderlich." } ], "release_date": "2023-08-08T22:00:00.000+00:00", "title": "CVE-2023-29303" }, { "cve": "CVE-2023-29299", "notes": [ { "category": "description", "text": "In Adobe Acrobat und Adobe Acrobat Reader existieren mehrere Schwachstellen. Die Ursachen sind ungen\u00fcgende Eingabe- und Zugriffskontrollen, Zugriff auf uninitialisierte Zeiger, Use After Free-, und Out of Bounds Read und Write Fehler. Ein Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsvorkehrungen zu umgehen, einen Denial of Service zu verursachen, Informationen offenzulegen oder Code auszuf\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Authentisierung oder eine Benutzeraktion erforderlich." } ], "release_date": "2023-08-08T22:00:00.000+00:00", "title": "CVE-2023-29299" } ] }
cve-2023-29320
Vulnerability from cvelistv5
Published
2023-08-10 13:17
Modified
2024-08-02 14:07
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an Violation of Secure Design Principles vulnerability that could result in arbitrary code execution in the context of the current user by bypassing the API blacklisting feature. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb23-30.html | vendor-advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Adobe | Acrobat Reader |
Version: 0 ≤ 23.003.20244 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T14:07:46.079Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb23-30.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "23.003.20244", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "datePublic": "2023-08-08T17:00:00.000Z", "descriptions": [ { "lang": "en", "value": "Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an Violation of Secure Design Principles vulnerability that could result in arbitrary code execution in the context of the current user by bypassing the API blacklisting feature. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "availabilityRequirement": "NOT_DEFINED", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "confidentialityRequirement": "NOT_DEFINED", "environmentalScore": 7.8, "environmentalSeverity": "HIGH", "exploitCodeMaturity": "NOT_DEFINED", "integrityImpact": "HIGH", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "LOW", "modifiedAttackVector": "LOCAL", "modifiedAvailabilityImpact": "HIGH", "modifiedConfidentialityImpact": "HIGH", "modifiedIntegrityImpact": "HIGH", "modifiedPrivilegesRequired": "NONE", "modifiedScope": "NOT_DEFINED", "modifiedUserInteraction": "REQUIRED", "privilegesRequired": "NONE", "remediationLevel": "NOT_DEFINED", "reportConfidence": "NOT_DEFINED", "scope": "UNCHANGED", "temporalScore": 7.8, "temporalSeverity": "HIGH", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-657", "description": "Violation of Secure Design Principles (CWE-657)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-10T13:17:48.806Z", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb23-30.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "ZDI-CAN-20712: Adobe Acrobat Blacklist Bypass Design flaw" } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2023-29320", "datePublished": "2023-08-10T13:17:48.806Z", "dateReserved": "2023-04-04T20:46:42.583Z", "dateUpdated": "2024-08-02T14:07:46.079Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-38247
Vulnerability from cvelistv5
Published
2023-08-10 13:17
Modified
2024-08-02 17:39
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb23-30.html | vendor-advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Adobe | Acrobat Reader |
Version: 0 ≤ 23.003.20244 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:39:11.990Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb23-30.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "23.003.20244", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "datePublic": "2023-08-08T17:00:00.000Z", "descriptions": [ { "lang": "en", "value": "Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "availabilityRequirement": "NOT_DEFINED", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "confidentialityRequirement": "NOT_DEFINED", "environmentalScore": 5.5, "environmentalSeverity": "MEDIUM", "exploitCodeMaturity": "NOT_DEFINED", "integrityImpact": "NONE", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "LOW", "modifiedAttackVector": "LOCAL", "modifiedAvailabilityImpact": "NONE", "modifiedConfidentialityImpact": "HIGH", "modifiedIntegrityImpact": "NONE", "modifiedPrivilegesRequired": "NONE", "modifiedScope": "NOT_DEFINED", "modifiedUserInteraction": "REQUIRED", "privilegesRequired": "NONE", "remediationLevel": "NOT_DEFINED", "reportConfidence": "NOT_DEFINED", "scope": "UNCHANGED", "temporalScore": 5.5, "temporalSeverity": "MEDIUM", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "Out-of-bounds Read (CWE-125)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-10T13:17:31.362Z", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb23-30.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "ZDI-CAN-21449: Adobe Acrobat Reader DC PDF File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability" } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2023-38247", "datePublished": "2023-08-10T13:17:31.362Z", "dateReserved": "2023-07-13T16:21:52.617Z", "dateUpdated": "2024-08-02T17:39:11.990Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-29303
Vulnerability from cvelistv5
Published
2023-08-10 13:17
Modified
2024-08-02 14:07
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by a Use After Free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb23-30.html | vendor-advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Adobe | Acrobat Reader |
Version: 0 ≤ 23.003.20244 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T14:07:45.564Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb23-30.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "23.003.20244", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "datePublic": "2023-08-08T17:00:00.000Z", "descriptions": [ { "lang": "en", "value": "Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by a Use After Free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "availabilityRequirement": "NOT_DEFINED", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "confidentialityRequirement": "NOT_DEFINED", "environmentalScore": 5.5, "environmentalSeverity": "MEDIUM", "exploitCodeMaturity": "NOT_DEFINED", "integrityImpact": "NONE", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "LOW", "modifiedAttackVector": "LOCAL", "modifiedAvailabilityImpact": "NONE", "modifiedConfidentialityImpact": "HIGH", "modifiedIntegrityImpact": "NONE", "modifiedPrivilegesRequired": "NONE", "modifiedScope": "NOT_DEFINED", "modifiedUserInteraction": "REQUIRED", "privilegesRequired": "NONE", "remediationLevel": "NOT_DEFINED", "reportConfidence": "NOT_DEFINED", "scope": "UNCHANGED", "temporalScore": 5.5, "temporalSeverity": "MEDIUM", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "Use After Free (CWE-416)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-10T13:17:44.653Z", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb23-30.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "ZDI-CAN-20970: Adobe Acrobat Reader DC AcroForm Annotation Use-After-Free Information Disclosure Vulnerability" } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2023-29303", "datePublished": "2023-08-10T13:17:44.653Z", "dateReserved": "2023-04-04T20:46:42.578Z", "dateUpdated": "2024-08-02T14:07:45.564Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-38228
Vulnerability from cvelistv5
Published
2023-08-10 13:17
Modified
2024-08-02 17:30
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb23-30.html | vendor-advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Adobe | Acrobat Reader |
Version: 0 ≤ 23.003.20244 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:30:14.190Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb23-30.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "23.003.20244", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "datePublic": "2023-08-08T17:00:00.000Z", "descriptions": [ { "lang": "en", "value": "Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "availabilityRequirement": "NOT_DEFINED", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "confidentialityRequirement": "NOT_DEFINED", "environmentalScore": 7.8, "environmentalSeverity": "HIGH", "exploitCodeMaturity": "NOT_DEFINED", "integrityImpact": "HIGH", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "LOW", "modifiedAttackVector": "LOCAL", "modifiedAvailabilityImpact": "HIGH", "modifiedConfidentialityImpact": "HIGH", "modifiedIntegrityImpact": "HIGH", "modifiedPrivilegesRequired": "NONE", "modifiedScope": "NOT_DEFINED", "modifiedUserInteraction": "REQUIRED", "privilegesRequired": "NONE", "remediationLevel": "NOT_DEFINED", "reportConfidence": "NOT_DEFINED", "scope": "UNCHANGED", "temporalScore": 7.8, "temporalSeverity": "HIGH", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "Use After Free (CWE-416)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-10T13:17:46.431Z", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb23-30.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "ZDI-CAN-21317: Adobe Acrobat Reader DC Font Parsing Use-After-Free Remote Code Execution Vulnerability" } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2023-38228", "datePublished": "2023-08-10T13:17:46.431Z", "dateReserved": "2023-07-13T16:21:52.615Z", "dateUpdated": "2024-08-02T17:30:14.190Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-38241
Vulnerability from cvelistv5
Published
2023-08-10 13:17
Modified
2024-08-02 17:30
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb23-30.html | vendor-advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Adobe | Acrobat Reader |
Version: 0 ≤ 23.003.20244 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:30:14.188Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb23-30.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "23.003.20244", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "datePublic": "2023-08-08T17:00:00.000Z", "descriptions": [ { "lang": "en", "value": "Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "availabilityRequirement": "NOT_DEFINED", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "confidentialityRequirement": "NOT_DEFINED", "environmentalScore": 5.5, "environmentalSeverity": "MEDIUM", "exploitCodeMaturity": "NOT_DEFINED", "integrityImpact": "NONE", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "LOW", "modifiedAttackVector": "LOCAL", "modifiedAvailabilityImpact": "NONE", "modifiedConfidentialityImpact": "HIGH", "modifiedIntegrityImpact": "NONE", "modifiedPrivilegesRequired": "NONE", "modifiedScope": "NOT_DEFINED", "modifiedUserInteraction": "REQUIRED", "privilegesRequired": "NONE", "remediationLevel": "NOT_DEFINED", "reportConfidence": "NOT_DEFINED", "scope": "UNCHANGED", "temporalScore": 5.5, "temporalSeverity": "MEDIUM", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "Out-of-bounds Read (CWE-125)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-10T13:17:26.555Z", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb23-30.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "ZDI-CAN-21246: Adobe Acrobat Reader DC Font Parsing Out-Of-Bounds Read Information Disclosure Vulnerability" } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2023-38241", "datePublished": "2023-08-10T13:17:26.555Z", "dateReserved": "2023-07-13T16:21:52.616Z", "dateUpdated": "2024-08-02T17:30:14.188Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-38232
Vulnerability from cvelistv5
Published
2023-08-10 13:17
Modified
2024-08-02 17:30
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb23-30.html | vendor-advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Adobe | Acrobat Reader |
Version: 0 ≤ 23.003.20244 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:30:14.401Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb23-30.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "23.003.20244", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "datePublic": "2023-08-08T17:00:00.000Z", "descriptions": [ { "lang": "en", "value": "Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "availabilityRequirement": "NOT_DEFINED", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "confidentialityRequirement": "NOT_DEFINED", "environmentalScore": 5.5, "environmentalSeverity": "MEDIUM", "exploitCodeMaturity": "NOT_DEFINED", "integrityImpact": "NONE", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "LOW", "modifiedAttackVector": "LOCAL", "modifiedAvailabilityImpact": "NONE", "modifiedConfidentialityImpact": "HIGH", "modifiedIntegrityImpact": "NONE", "modifiedPrivilegesRequired": "NONE", "modifiedScope": "NOT_DEFINED", "modifiedUserInteraction": "REQUIRED", "privilegesRequired": "NONE", "remediationLevel": "NOT_DEFINED", "reportConfidence": "NOT_DEFINED", "scope": "UNCHANGED", "temporalScore": 5.5, "temporalSeverity": "MEDIUM", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "Out-of-bounds Read (CWE-125)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-10T13:17:34.237Z", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb23-30.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "ZDI-CAN-21357: Adobe Acrobat Reader DC Font Parsing Out-Of-Bounds Read Information Disclosure Vulnerability" } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2023-38232", "datePublished": "2023-08-10T13:17:34.237Z", "dateReserved": "2023-07-13T16:21:52.615Z", "dateUpdated": "2024-08-02T17:30:14.401Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-38222
Vulnerability from cvelistv5
Published
2023-08-10 13:17
Modified
2024-08-02 17:30
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb23-30.html | vendor-advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Adobe | Acrobat Reader |
Version: 0 ≤ 23.003.20244 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:30:14.190Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb23-30.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "23.003.20244", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "datePublic": "2023-08-08T17:00:00.000Z", "descriptions": [ { "lang": "en", "value": "Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "availabilityRequirement": "NOT_DEFINED", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "confidentialityRequirement": "NOT_DEFINED", "environmentalScore": 7.8, "environmentalSeverity": "HIGH", "exploitCodeMaturity": "NOT_DEFINED", "integrityImpact": "HIGH", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "LOW", "modifiedAttackVector": "LOCAL", "modifiedAvailabilityImpact": "HIGH", "modifiedConfidentialityImpact": "HIGH", "modifiedIntegrityImpact": "HIGH", "modifiedPrivilegesRequired": "NONE", "modifiedScope": "NOT_DEFINED", "modifiedUserInteraction": "REQUIRED", "privilegesRequired": "NONE", "remediationLevel": "NOT_DEFINED", "reportConfidence": "NOT_DEFINED", "scope": "UNCHANGED", "temporalScore": 7.8, "temporalSeverity": "HIGH", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "Use After Free (CWE-416)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-10T13:17:40.922Z", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb23-30.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "ZDI-CAN-21103: Adobe Acrobat Reader DC AcroForm spawnPageFromTemplate Use-After-Free Remote Code Execution Vulnerability" } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2023-38222", "datePublished": "2023-08-10T13:17:40.922Z", "dateReserved": "2023-07-13T16:21:52.614Z", "dateUpdated": "2024-08-02T17:30:14.190Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-38238
Vulnerability from cvelistv5
Published
2023-08-10 13:17
Modified
2024-08-02 17:30
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by a Use-After-Free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb23-30.html | vendor-advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Adobe | Acrobat Reader |
Version: 0 ≤ 23.003.20244 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:30:14.169Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb23-30.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "23.003.20244", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "datePublic": "2023-08-08T17:00:00.000Z", "descriptions": [ { "lang": "en", "value": "Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by a Use-After-Free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "availabilityRequirement": "NOT_DEFINED", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "confidentialityRequirement": "NOT_DEFINED", "environmentalScore": 5.5, "environmentalSeverity": "MEDIUM", "exploitCodeMaturity": "NOT_DEFINED", "integrityImpact": "NONE", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "LOW", "modifiedAttackVector": "LOCAL", "modifiedAvailabilityImpact": "NONE", "modifiedConfidentialityImpact": "HIGH", "modifiedIntegrityImpact": "NONE", "modifiedPrivilegesRequired": "NONE", "modifiedScope": "NOT_DEFINED", "modifiedUserInteraction": "REQUIRED", "privilegesRequired": "NONE", "remediationLevel": "NOT_DEFINED", "reportConfidence": "NOT_DEFINED", "scope": "UNCHANGED", "temporalScore": 5.5, "temporalSeverity": "MEDIUM", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "Use After Free (CWE-416)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-10T13:17:37.123Z", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb23-30.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "ZDI-CAN-21243: Adobe Acrobat Reader DC Font Parsing Use-After-Free Information Disclosure Vulnerability" } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2023-38238", "datePublished": "2023-08-10T13:17:37.123Z", "dateReserved": "2023-07-13T16:21:52.616Z", "dateUpdated": "2024-08-02T17:30:14.169Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-38229
Vulnerability from cvelistv5
Published
2023-08-10 13:17
Modified
2024-08-02 17:30
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an out-of-bounds read vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb23-30.html | vendor-advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Adobe | Acrobat Reader |
Version: 0 ≤ 23.003.20244 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:30:14.205Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb23-30.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "23.003.20244", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "datePublic": "2023-08-08T17:00:00.000Z", "descriptions": [ { "lang": "en", "value": "Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an out-of-bounds read vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "availabilityRequirement": "NOT_DEFINED", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "confidentialityRequirement": "NOT_DEFINED", "environmentalScore": 7.8, "environmentalSeverity": "HIGH", "exploitCodeMaturity": "NOT_DEFINED", "integrityImpact": "HIGH", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "LOW", "modifiedAttackVector": "LOCAL", "modifiedAvailabilityImpact": "HIGH", "modifiedConfidentialityImpact": "HIGH", "modifiedIntegrityImpact": "HIGH", "modifiedPrivilegesRequired": "NONE", "modifiedScope": "NOT_DEFINED", "modifiedUserInteraction": "REQUIRED", "privilegesRequired": "NONE", "remediationLevel": "NOT_DEFINED", "reportConfidence": "NOT_DEFINED", "scope": "UNCHANGED", "temporalScore": 7.8, "temporalSeverity": "HIGH", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "Out-of-bounds Read (CWE-125)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-14T12:28:48.519Z", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb23-30.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "ZDI-CAN-21310: Adobe Acrobat Reader DC Font Parsing Out-Of-Bounds Read Information Disclosure Vulnerability" } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2023-38229", "datePublished": "2023-08-10T13:17:43.079Z", "dateReserved": "2023-07-13T16:21:52.615Z", "dateUpdated": "2024-08-02T17:30:14.205Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-38248
Vulnerability from cvelistv5
Published
2023-08-10 13:17
Modified
2024-08-02 17:39
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb23-30.html | vendor-advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Adobe | Acrobat Reader |
Version: 0 ≤ 23.003.20244 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:39:11.983Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb23-30.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "23.003.20244", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "datePublic": "2023-08-08T17:00:00.000Z", "descriptions": [ { "lang": "en", "value": "Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "availabilityRequirement": "NOT_DEFINED", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "confidentialityRequirement": "NOT_DEFINED", "environmentalScore": 5.5, "environmentalSeverity": "MEDIUM", "exploitCodeMaturity": "NOT_DEFINED", "integrityImpact": "NONE", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "LOW", "modifiedAttackVector": "LOCAL", "modifiedAvailabilityImpact": "NONE", "modifiedConfidentialityImpact": "HIGH", "modifiedIntegrityImpact": "NONE", "modifiedPrivilegesRequired": "NONE", "modifiedScope": "NOT_DEFINED", "modifiedUserInteraction": "REQUIRED", "privilegesRequired": "NONE", "remediationLevel": "NOT_DEFINED", "reportConfidence": "NOT_DEFINED", "scope": "UNCHANGED", "temporalScore": 5.5, "temporalSeverity": "MEDIUM", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "Out-of-bounds Read (CWE-125)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-10T13:17:33.447Z", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb23-30.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "ZDI-CAN-21494: Adobe Acrobat Reader DC PDF Parsing Out-Of-Bounds Read Information Disclosure Vulnerability" } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2023-38248", "datePublished": "2023-08-10T13:17:33.447Z", "dateReserved": "2023-07-13T16:21:52.617Z", "dateUpdated": "2024-08-02T17:39:11.983Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-38236
Vulnerability from cvelistv5
Published
2023-08-10 13:17
Modified
2024-08-02 17:30
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb23-30.html | vendor-advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Adobe | Acrobat Reader |
Version: 0 ≤ 23.003.20244 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:30:14.345Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb23-30.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "23.003.20244", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "datePublic": "2023-08-08T17:00:00.000Z", "descriptions": [ { "lang": "en", "value": "Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "availabilityRequirement": "NOT_DEFINED", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "confidentialityRequirement": "NOT_DEFINED", "environmentalScore": 5.5, "environmentalSeverity": "MEDIUM", "exploitCodeMaturity": "NOT_DEFINED", "integrityImpact": "NONE", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "LOW", "modifiedAttackVector": "LOCAL", "modifiedAvailabilityImpact": "NONE", "modifiedConfidentialityImpact": "HIGH", "modifiedIntegrityImpact": "NONE", "modifiedPrivilegesRequired": "NONE", "modifiedScope": "NOT_DEFINED", "modifiedUserInteraction": "REQUIRED", "privilegesRequired": "NONE", "remediationLevel": "NOT_DEFINED", "reportConfidence": "NOT_DEFINED", "scope": "UNCHANGED", "temporalScore": 5.5, "temporalSeverity": "MEDIUM", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "Out-of-bounds Read (CWE-125)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-10T13:17:36.335Z", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb23-30.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "ZDI-CAN-21247: Adobe Acrobat Reader DC Font Parsing Out-Of-Bounds Read Information Disclosure Vulnerability" } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2023-38236", "datePublished": "2023-08-10T13:17:36.335Z", "dateReserved": "2023-07-13T16:21:52.616Z", "dateUpdated": "2024-08-02T17:30:14.345Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-38231
Vulnerability from cvelistv5
Published
2023-08-10 13:17
Modified
2024-08-02 17:30
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb23-30.html | vendor-advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Adobe | Acrobat Reader |
Version: 0 ≤ 23.003.20244 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:30:14.200Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb23-30.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "23.003.20244", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "datePublic": "2023-08-08T17:00:00.000Z", "descriptions": [ { "lang": "en", "value": "Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "availabilityRequirement": "NOT_DEFINED", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "confidentialityRequirement": "NOT_DEFINED", "environmentalScore": 7.8, "environmentalSeverity": "HIGH", "exploitCodeMaturity": "NOT_DEFINED", "integrityImpact": "HIGH", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "LOW", "modifiedAttackVector": "LOCAL", "modifiedAvailabilityImpact": "HIGH", "modifiedConfidentialityImpact": "HIGH", "modifiedIntegrityImpact": "HIGH", "modifiedPrivilegesRequired": "NONE", "modifiedScope": "NOT_DEFINED", "modifiedUserInteraction": "REQUIRED", "privilegesRequired": "NONE", "remediationLevel": "NOT_DEFINED", "reportConfidence": "NOT_DEFINED", "scope": "UNCHANGED", "temporalScore": 7.8, "temporalSeverity": "HIGH", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "Out-of-bounds Write (CWE-787)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-10T13:17:45.594Z", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb23-30.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "ZDI-CAN-21334: Adobe Acrobat Reader DC Font Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability" } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2023-38231", "datePublished": "2023-08-10T13:17:45.594Z", "dateReserved": "2023-07-13T16:21:52.615Z", "dateUpdated": "2024-08-02T17:30:14.200Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-38226
Vulnerability from cvelistv5
Published
2023-08-10 13:17
Modified
2024-08-02 17:30
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb23-30.html | vendor-advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Adobe | Acrobat Reader |
Version: 0 ≤ 23.003.20244 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:30:14.193Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb23-30.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "23.003.20244", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "datePublic": "2023-08-08T17:00:00.000Z", "descriptions": [ { "lang": "en", "value": "Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "availabilityRequirement": "NOT_DEFINED", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "confidentialityRequirement": "NOT_DEFINED", "environmentalScore": 7.8, "environmentalSeverity": "HIGH", "exploitCodeMaturity": "NOT_DEFINED", "integrityImpact": "HIGH", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "LOW", "modifiedAttackVector": "LOCAL", "modifiedAvailabilityImpact": "HIGH", "modifiedConfidentialityImpact": "HIGH", "modifiedIntegrityImpact": "HIGH", "modifiedPrivilegesRequired": "NONE", "modifiedScope": "NOT_DEFINED", "modifiedUserInteraction": "REQUIRED", "privilegesRequired": "NONE", "remediationLevel": "NOT_DEFINED", "reportConfidence": "NOT_DEFINED", "scope": "UNCHANGED", "temporalScore": 7.8, "temporalSeverity": "HIGH", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-824", "description": "Access of Uninitialized Pointer (CWE-824)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-10T13:17:47.227Z", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb23-30.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "ZDI-CAN-21240: Adobe Acrobat Reader DC Font Parsing Uninitialized Variable Remote Code Execution Vulnerability" } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2023-38226", "datePublished": "2023-08-10T13:17:47.227Z", "dateReserved": "2023-07-13T16:21:52.615Z", "dateUpdated": "2024-08-02T17:30:14.193Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-38224
Vulnerability from cvelistv5
Published
2023-08-10 13:17
Modified
2024-08-02 17:30
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb23-30.html | vendor-advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Adobe | Acrobat Reader |
Version: 0 ≤ 23.003.20244 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:30:14.091Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb23-30.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "23.003.20244", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "datePublic": "2023-08-08T17:00:00.000Z", "descriptions": [ { "lang": "en", "value": "Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "availabilityRequirement": "NOT_DEFINED", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "confidentialityRequirement": "NOT_DEFINED", "environmentalScore": 7.8, "environmentalSeverity": "HIGH", "exploitCodeMaturity": "NOT_DEFINED", "integrityImpact": "HIGH", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "LOW", "modifiedAttackVector": "LOCAL", "modifiedAvailabilityImpact": "HIGH", "modifiedConfidentialityImpact": "HIGH", "modifiedIntegrityImpact": "HIGH", "modifiedPrivilegesRequired": "NONE", "modifiedScope": "NOT_DEFINED", "modifiedUserInteraction": "REQUIRED", "privilegesRequired": "NONE", "remediationLevel": "NOT_DEFINED", "reportConfidence": "NOT_DEFINED", "scope": "UNCHANGED", "temporalScore": 7.8, "temporalSeverity": "HIGH", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "Use After Free (CWE-416)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-10T13:17:25.780Z", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb23-30.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "ZDI-CAN-21122: Adobe Acrobat Reader DC Annotation Use-After-Free Remote Code Execution Vulnerability" } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2023-38224", "datePublished": "2023-08-10T13:17:25.780Z", "dateReserved": "2023-07-13T16:21:52.614Z", "dateUpdated": "2024-08-02T17:30:14.091Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-38239
Vulnerability from cvelistv5
Published
2023-08-10 13:17
Modified
2024-08-02 17:30
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb23-30.html | vendor-advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Adobe | Acrobat Reader |
Version: 0 ≤ 23.003.20244 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:30:14.264Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb23-30.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "23.003.20244", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "datePublic": "2023-08-08T17:00:00.000Z", "descriptions": [ { "lang": "en", "value": "Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "availabilityRequirement": "NOT_DEFINED", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "confidentialityRequirement": "NOT_DEFINED", "environmentalScore": 5.5, "environmentalSeverity": "MEDIUM", "exploitCodeMaturity": "NOT_DEFINED", "integrityImpact": "NONE", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "LOW", "modifiedAttackVector": "LOCAL", "modifiedAvailabilityImpact": "NONE", "modifiedConfidentialityImpact": "HIGH", "modifiedIntegrityImpact": "NONE", "modifiedPrivilegesRequired": "NONE", "modifiedScope": "NOT_DEFINED", "modifiedUserInteraction": "REQUIRED", "privilegesRequired": "NONE", "remediationLevel": "NOT_DEFINED", "reportConfidence": "NOT_DEFINED", "scope": "UNCHANGED", "temporalScore": 5.5, "temporalSeverity": "MEDIUM", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "Out-of-bounds Read (CWE-125)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-10T13:17:28.116Z", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb23-30.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "ZDI-CAN-21242: Adobe Acrobat Reader DC Font Parsing Out-Of-Bounds Read Information Disclosure Vulnerability" } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2023-38239", "datePublished": "2023-08-10T13:17:28.116Z", "dateReserved": "2023-07-13T16:21:52.616Z", "dateUpdated": "2024-08-02T17:30:14.264Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-38235
Vulnerability from cvelistv5
Published
2023-08-10 13:17
Modified
2024-08-02 17:30
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb23-30.html | vendor-advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Adobe | Acrobat Reader |
Version: 0 ≤ 23.003.20244 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:30:14.118Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb23-30.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "23.003.20244", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "datePublic": "2023-08-01T17:00:00.000Z", "descriptions": [ { "lang": "en", "value": "Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "availabilityRequirement": "NOT_DEFINED", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "confidentialityRequirement": "NOT_DEFINED", "environmentalScore": 5.5, "environmentalSeverity": "MEDIUM", "exploitCodeMaturity": "NOT_DEFINED", "integrityImpact": "NONE", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "LOW", "modifiedAttackVector": "LOCAL", "modifiedAvailabilityImpact": "NONE", "modifiedConfidentialityImpact": "HIGH", "modifiedIntegrityImpact": "NONE", "modifiedPrivilegesRequired": "NONE", "modifiedScope": "NOT_DEFINED", "modifiedUserInteraction": "REQUIRED", "privilegesRequired": "NONE", "remediationLevel": "NOT_DEFINED", "reportConfidence": "NOT_DEFINED", "scope": "UNCHANGED", "temporalScore": 5.5, "temporalSeverity": "MEDIUM", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "Out-of-bounds Read (CWE-125)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-14T12:30:59.866Z", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb23-30.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "ZDI-CAN-21356: Adobe Acrobat Reader DC Font Parsing Out-Of-Bounds Read Information Disclosure Vulnerability" } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2023-38235", "datePublished": "2023-08-10T13:17:35.014Z", "dateReserved": "2023-07-13T16:21:52.616Z", "dateUpdated": "2024-08-02T17:30:14.118Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-29299
Vulnerability from cvelistv5
Published
2023-08-10 13:17
Modified
2024-08-02 14:07
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an Untrusted Search Path vulnerability that could lead to Application denial-of-service. An attacker could leverage this vulnerability if the default PowerShell Set-ExecutionPolicy is set to Unrestricted, making the attack complexity high. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb23-30.html | vendor-advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Adobe | Acrobat Reader |
Version: 0 ≤ 23.003.20244 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T14:07:44.392Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb23-30.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "23.003.20244", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "datePublic": "2023-08-08T17:00:00.000Z", "descriptions": [ { "lang": "en", "value": "Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an Untrusted Search Path vulnerability that could lead to Application denial-of-service. An attacker could leverage this vulnerability if the default PowerShell Set-ExecutionPolicy is set to Unrestricted, making the attack complexity high. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "availabilityRequirement": "NOT_DEFINED", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "confidentialityRequirement": "NOT_DEFINED", "environmentalScore": 4.7, "environmentalSeverity": "MEDIUM", "exploitCodeMaturity": "NOT_DEFINED", "integrityImpact": "NONE", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "HIGH", "modifiedAttackVector": "LOCAL", "modifiedAvailabilityImpact": "HIGH", "modifiedConfidentialityImpact": "NONE", "modifiedIntegrityImpact": "NONE", "modifiedPrivilegesRequired": "NONE", "modifiedScope": "NOT_DEFINED", "modifiedUserInteraction": "REQUIRED", "privilegesRequired": "NONE", "remediationLevel": "NOT_DEFINED", "reportConfidence": "NOT_DEFINED", "scope": "UNCHANGED", "temporalScore": 4.7, "temporalSeverity": "MEDIUM", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-426", "description": "Untrusted Search Path (CWE-426)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-10T13:17:48.014Z", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb23-30.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "Adobe Acrobat Reader Untrusted Search Path Application denial-of-service" } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2023-29299", "datePublished": "2023-08-10T13:17:48.014Z", "dateReserved": "2023-04-04T20:46:42.577Z", "dateUpdated": "2024-08-02T14:07:44.392Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-38234
Vulnerability from cvelistv5
Published
2023-08-10 13:17
Modified
2024-08-02 17:30
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb23-30.html | vendor-advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Adobe | Acrobat Reader |
Version: 0 ≤ 23.003.20244 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:30:14.082Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb23-30.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "23.003.20244", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "datePublic": "2023-08-08T17:00:00.000Z", "descriptions": [ { "lang": "en", "value": "Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "availabilityRequirement": "NOT_DEFINED", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "confidentialityRequirement": "NOT_DEFINED", "environmentalScore": 7.8, "environmentalSeverity": "HIGH", "exploitCodeMaturity": "NOT_DEFINED", "integrityImpact": "HIGH", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "LOW", "modifiedAttackVector": "LOCAL", "modifiedAvailabilityImpact": "HIGH", "modifiedConfidentialityImpact": "HIGH", "modifiedIntegrityImpact": "HIGH", "modifiedPrivilegesRequired": "NONE", "modifiedScope": "NOT_DEFINED", "modifiedUserInteraction": "REQUIRED", "privilegesRequired": "NONE", "remediationLevel": "NOT_DEFINED", "reportConfidence": "NOT_DEFINED", "scope": "UNCHANGED", "temporalScore": 7.8, "temporalSeverity": "HIGH", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-824", "description": "Access of Uninitialized Pointer (CWE-824)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-10T13:17:25.022Z", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb23-30.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "ZDI-CAN-21359: Adobe Acrobat Reader DC Font Parsing Uninitialized Variable Remote Code Execution Vulnerability" } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2023-38234", "datePublished": "2023-08-10T13:17:25.022Z", "dateReserved": "2023-07-13T16:21:52.615Z", "dateUpdated": "2024-08-02T17:30:14.082Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-38242
Vulnerability from cvelistv5
Published
2023-08-10 13:17
Modified
2024-08-02 17:30
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb23-30.html | vendor-advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Adobe | Acrobat Reader |
Version: 0 ≤ 23.003.20244 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:30:14.209Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb23-30.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "23.003.20244", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "datePublic": "2023-08-08T17:00:00.000Z", "descriptions": [ { "lang": "en", "value": "Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "availabilityRequirement": "NOT_DEFINED", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "confidentialityRequirement": "NOT_DEFINED", "environmentalScore": 5.5, "environmentalSeverity": "MEDIUM", "exploitCodeMaturity": "NOT_DEFINED", "integrityImpact": "NONE", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "LOW", "modifiedAttackVector": "LOCAL", "modifiedAvailabilityImpact": "NONE", "modifiedConfidentialityImpact": "HIGH", "modifiedIntegrityImpact": "NONE", "modifiedPrivilegesRequired": "NONE", "modifiedScope": "NOT_DEFINED", "modifiedUserInteraction": "REQUIRED", "privilegesRequired": "NONE", "remediationLevel": "NOT_DEFINED", "reportConfidence": "NOT_DEFINED", "scope": "UNCHANGED", "temporalScore": 5.5, "temporalSeverity": "MEDIUM", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "Out-of-bounds Read (CWE-125)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-10T13:17:29.730Z", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb23-30.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "ZDI-CAN-21387: Adobe Acrobat Reader DC Font Parsing Out-Of-Bounds Read Information Disclosure Vulnerability" } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2023-38242", "datePublished": "2023-08-10T13:17:29.730Z", "dateReserved": "2023-07-13T16:21:52.616Z", "dateUpdated": "2024-08-02T17:30:14.209Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-38243
Vulnerability from cvelistv5
Published
2023-08-10 13:17
Modified
2024-08-02 17:30
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by a Use-After-Free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb23-30.html | vendor-advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Adobe | Acrobat Reader |
Version: 0 ≤ 23.003.20244 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:30:14.304Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb23-30.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "23.003.20244", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "datePublic": "2023-08-08T17:00:00.000Z", "descriptions": [ { "lang": "en", "value": "Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by a Use-After-Free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "availabilityRequirement": "NOT_DEFINED", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "confidentialityRequirement": "NOT_DEFINED", "environmentalScore": 5.5, "environmentalSeverity": "MEDIUM", "exploitCodeMaturity": "NOT_DEFINED", "integrityImpact": "NONE", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "LOW", "modifiedAttackVector": "LOCAL", "modifiedAvailabilityImpact": "NONE", "modifiedConfidentialityImpact": "HIGH", "modifiedIntegrityImpact": "NONE", "modifiedPrivilegesRequired": "NONE", "modifiedScope": "NOT_DEFINED", "modifiedUserInteraction": "REQUIRED", "privilegesRequired": "NONE", "remediationLevel": "NOT_DEFINED", "reportConfidence": "NOT_DEFINED", "scope": "UNCHANGED", "temporalScore": 5.5, "temporalSeverity": "MEDIUM", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "Use After Free (CWE-416)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-10T13:17:23.685Z", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb23-30.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "ZDI-CAN-21252: Adobe Acrobat Reader DC JBIG2 File Parsing Use-After-Free Information Disclosure Vulnerability" } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2023-38243", "datePublished": "2023-08-10T13:17:23.685Z", "dateReserved": "2023-07-13T16:21:52.616Z", "dateUpdated": "2024-08-02T17:30:14.304Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-38225
Vulnerability from cvelistv5
Published
2023-08-10 13:17
Modified
2024-08-02 17:30
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb23-30.html | vendor-advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Adobe | Acrobat Reader |
Version: 0 ≤ 23.003.20244 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:30:14.061Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb23-30.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "23.003.20244", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "datePublic": "2023-08-08T17:00:00.000Z", "descriptions": [ { "lang": "en", "value": "Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "availabilityRequirement": "NOT_DEFINED", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "confidentialityRequirement": "NOT_DEFINED", "environmentalScore": 7.8, "environmentalSeverity": "HIGH", "exploitCodeMaturity": "NOT_DEFINED", "integrityImpact": "HIGH", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "LOW", "modifiedAttackVector": "LOCAL", "modifiedAvailabilityImpact": "HIGH", "modifiedConfidentialityImpact": "HIGH", "modifiedIntegrityImpact": "HIGH", "modifiedPrivilegesRequired": "NONE", "modifiedScope": "NOT_DEFINED", "modifiedUserInteraction": "REQUIRED", "privilegesRequired": "NONE", "remediationLevel": "NOT_DEFINED", "reportConfidence": "NOT_DEFINED", "scope": "UNCHANGED", "temporalScore": 7.8, "temporalSeverity": "HIGH", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "Use After Free (CWE-416)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-10T13:17:43.864Z", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb23-30.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "ZDI-CAN-21118: Adobe Acrobat Reader DC AcroForm Use-After-Free Remote Code Execution Vulnerability" } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2023-38225", "datePublished": "2023-08-10T13:17:43.864Z", "dateReserved": "2023-07-13T16:21:52.614Z", "dateUpdated": "2024-08-02T17:30:14.061Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-38237
Vulnerability from cvelistv5
Published
2023-08-10 13:17
Modified
2024-08-02 17:30
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb23-30.html | vendor-advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Adobe | Acrobat Reader |
Version: 0 ≤ 23.003.20244 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:30:14.272Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb23-30.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "23.003.20244", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "datePublic": "2023-08-08T17:00:00.000Z", "descriptions": [ { "lang": "en", "value": "Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "availabilityRequirement": "NOT_DEFINED", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "confidentialityRequirement": "NOT_DEFINED", "environmentalScore": 5.5, "environmentalSeverity": "MEDIUM", "exploitCodeMaturity": "NOT_DEFINED", "integrityImpact": "NONE", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "LOW", "modifiedAttackVector": "LOCAL", "modifiedAvailabilityImpact": "NONE", "modifiedConfidentialityImpact": "HIGH", "modifiedIntegrityImpact": "NONE", "modifiedPrivilegesRequired": "NONE", "modifiedScope": "NOT_DEFINED", "modifiedUserInteraction": "REQUIRED", "privilegesRequired": "NONE", "remediationLevel": "NOT_DEFINED", "reportConfidence": "NOT_DEFINED", "scope": "UNCHANGED", "temporalScore": 5.5, "temporalSeverity": "MEDIUM", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "Out-of-bounds Read (CWE-125)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-10T13:17:30.548Z", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb23-30.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "ZDI-CAN-21244: Adobe Acrobat Reader DC Font Parsing Out-Of-Bounds Read Information Disclosure Vulnerability" } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2023-38237", "datePublished": "2023-08-10T13:17:30.548Z", "dateReserved": "2023-07-13T16:21:52.616Z", "dateUpdated": "2024-08-02T17:30:14.272Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-38230
Vulnerability from cvelistv5
Published
2023-08-10 13:17
Modified
2024-08-02 17:30
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by a Use-After-Free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb23-30.html | vendor-advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Adobe | Acrobat Reader |
Version: 0 ≤ 23.003.20244 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:30:14.127Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb23-30.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "23.003.20244", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "datePublic": "2023-08-08T17:00:00.000Z", "descriptions": [ { "lang": "en", "value": "Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by a Use-After-Free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "availabilityRequirement": "NOT_DEFINED", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "confidentialityRequirement": "NOT_DEFINED", "environmentalScore": 5.5, "environmentalSeverity": "MEDIUM", "exploitCodeMaturity": "NOT_DEFINED", "integrityImpact": "NONE", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "LOW", "modifiedAttackVector": "LOCAL", "modifiedAvailabilityImpact": "NONE", "modifiedConfidentialityImpact": "HIGH", "modifiedIntegrityImpact": "NONE", "modifiedPrivilegesRequired": "NONE", "modifiedScope": "NOT_DEFINED", "modifiedUserInteraction": "REQUIRED", "privilegesRequired": "NONE", "remediationLevel": "NOT_DEFINED", "reportConfidence": "NOT_DEFINED", "scope": "UNCHANGED", "temporalScore": 5.5, "temporalSeverity": "MEDIUM", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "Use After Free (CWE-416)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-10T13:17:27.345Z", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb23-30.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "ZDI-CAN-21318: Adobe Acrobat Reader DC Font Parsing Use-After-Free Information Disclosure Vulnerability" } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2023-38230", "datePublished": "2023-08-10T13:17:27.345Z", "dateReserved": "2023-07-13T16:21:52.615Z", "dateUpdated": "2024-08-02T17:30:14.127Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-38223
Vulnerability from cvelistv5
Published
2023-08-10 13:17
Modified
2024-08-02 17:30
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an Access of Uninitialized Pointer that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb23-30.html | vendor-advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Adobe | Acrobat Reader |
Version: 0 ≤ 23.003.20244 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:30:14.096Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb23-30.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "23.003.20244", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "datePublic": "2023-08-08T17:00:00.000Z", "descriptions": [ { "lang": "en", "value": "Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an Access of Uninitialized Pointer that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "availabilityRequirement": "NOT_DEFINED", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "confidentialityRequirement": "NOT_DEFINED", "environmentalScore": 7.8, "environmentalSeverity": "HIGH", "exploitCodeMaturity": "NOT_DEFINED", "integrityImpact": "HIGH", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "LOW", "modifiedAttackVector": "LOCAL", "modifiedAvailabilityImpact": "HIGH", "modifiedConfidentialityImpact": "HIGH", "modifiedIntegrityImpact": "HIGH", "modifiedPrivilegesRequired": "NONE", "modifiedScope": "NOT_DEFINED", "modifiedUserInteraction": "REQUIRED", "privilegesRequired": "NONE", "remediationLevel": "NOT_DEFINED", "reportConfidence": "NOT_DEFINED", "scope": "UNCHANGED", "temporalScore": 7.8, "temporalSeverity": "HIGH", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-824", "description": "Access of Uninitialized Pointer (CWE-824)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-10T13:17:38.719Z", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb23-30.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "ZDI-CAN-21063: Adobe Acrobat Reader DC Font Parsing Uninitialized Variable Remote Code Execution Vulnerability" } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2023-38223", "datePublished": "2023-08-10T13:17:38.719Z", "dateReserved": "2023-07-13T16:21:52.614Z", "dateUpdated": "2024-08-02T17:30:14.096Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-38245
Vulnerability from cvelistv5
Published
2023-08-10 13:17
Modified
2024-08-02 17:39
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an Information Disclosure vulnerability. An unauthenticated attacker could leverage this vulnerability to obtain NTLMv2 credentials. Exploitation of this issue requires user interaction in that a victim must open a maliciously crafted Microsoft Office file, or visit an attacker controlled web page.
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb23-30.html | vendor-advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Adobe | Acrobat Reader |
Version: 0 ≤ 23.003.20244 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:39:11.983Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb23-30.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "23.003.20244", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "datePublic": "2023-08-08T17:00:00.000Z", "descriptions": [ { "lang": "en", "value": "Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an Information Disclosure vulnerability. An unauthenticated attacker could leverage this vulnerability to obtain NTLMv2 credentials. Exploitation of this issue requires user interaction in that a victim must open a maliciously crafted Microsoft Office file, or visit an attacker controlled web page." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "availabilityRequirement": "NOT_DEFINED", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "confidentialityRequirement": "NOT_DEFINED", "environmentalScore": 5.5, "environmentalSeverity": "MEDIUM", "exploitCodeMaturity": "NOT_DEFINED", "integrityImpact": "NONE", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "LOW", "modifiedAttackVector": "LOCAL", "modifiedAvailabilityImpact": "NONE", "modifiedConfidentialityImpact": "HIGH", "modifiedIntegrityImpact": "NONE", "modifiedPrivilegesRequired": "NONE", "modifiedScope": "NOT_DEFINED", "modifiedUserInteraction": "REQUIRED", "privilegesRequired": "NONE", "remediationLevel": "NOT_DEFINED", "reportConfidence": "NOT_DEFINED", "scope": "UNCHANGED", "temporalScore": 5.5, "temporalSeverity": "MEDIUM", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "Information Exposure (CWE-200)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-10T13:17:37.919Z", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb23-30.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "Adobe Acrobat Reader DC ActiveX Control (AxAcroPDFLib.AxAcroPDF) src NTLMv2 SSO Hash Theft Vulnerability" } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2023-38245", "datePublished": "2023-08-10T13:17:37.919Z", "dateReserved": "2023-07-13T16:21:52.617Z", "dateUpdated": "2024-08-02T17:39:11.983Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-38227
Vulnerability from cvelistv5
Published
2023-08-10 13:17
Modified
2024-08-02 17:30
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb23-30.html | vendor-advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Adobe | Acrobat Reader |
Version: 0 ≤ 23.003.20244 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:30:14.132Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb23-30.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "23.003.20244", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "datePublic": "2023-08-08T17:00:00.000Z", "descriptions": [ { "lang": "en", "value": "Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "availabilityRequirement": "NOT_DEFINED", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "confidentialityRequirement": "NOT_DEFINED", "environmentalScore": 7.8, "environmentalSeverity": "HIGH", "exploitCodeMaturity": "NOT_DEFINED", "integrityImpact": "HIGH", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "LOW", "modifiedAttackVector": "LOCAL", "modifiedAvailabilityImpact": "HIGH", "modifiedConfidentialityImpact": "HIGH", "modifiedIntegrityImpact": "HIGH", "modifiedPrivilegesRequired": "NONE", "modifiedScope": "NOT_DEFINED", "modifiedUserInteraction": "REQUIRED", "privilegesRequired": "NONE", "remediationLevel": "NOT_DEFINED", "reportConfidence": "NOT_DEFINED", "scope": "UNCHANGED", "temporalScore": 7.8, "temporalSeverity": "HIGH", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "Use After Free (CWE-416)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-10T13:17:40.133Z", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb23-30.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "ZDI-CAN-21241: Adobe Acrobat Reader DC Font Parsing Use-After-Free Remote Code Execution Vulnerability" } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2023-38227", "datePublished": "2023-08-10T13:17:40.133Z", "dateReserved": "2023-07-13T16:21:52.615Z", "dateUpdated": "2024-08-02T17:30:14.132Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-38240
Vulnerability from cvelistv5
Published
2023-08-10 13:17
Modified
2024-08-02 17:30
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb23-30.html | vendor-advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Adobe | Acrobat Reader |
Version: 0 ≤ 23.003.20244 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:30:14.339Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb23-30.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "23.003.20244", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "datePublic": "2023-08-08T17:00:00.000Z", "descriptions": [ { "lang": "en", "value": "Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "availabilityRequirement": "NOT_DEFINED", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "confidentialityRequirement": "NOT_DEFINED", "environmentalScore": 5.5, "environmentalSeverity": "MEDIUM", "exploitCodeMaturity": "NOT_DEFINED", "integrityImpact": "NONE", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "LOW", "modifiedAttackVector": "LOCAL", "modifiedAvailabilityImpact": "NONE", "modifiedConfidentialityImpact": "HIGH", "modifiedIntegrityImpact": "NONE", "modifiedPrivilegesRequired": "NONE", "modifiedScope": "NOT_DEFINED", "modifiedUserInteraction": "REQUIRED", "privilegesRequired": "NONE", "remediationLevel": "NOT_DEFINED", "reportConfidence": "NOT_DEFINED", "scope": "UNCHANGED", "temporalScore": 5.5, "temporalSeverity": "MEDIUM", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "Out-of-bounds Read (CWE-125)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-10T13:17:28.966Z", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb23-30.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "ZDI-CAN-21245: Adobe Acrobat Reader DC Font Parsing Out-Of-Bounds Read Information Disclosure Vulnerability" } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2023-38240", "datePublished": "2023-08-10T13:17:28.966Z", "dateReserved": "2023-07-13T16:21:52.616Z", "dateUpdated": "2024-08-02T17:30:14.339Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-38233
Vulnerability from cvelistv5
Published
2023-08-10 13:17
Modified
2024-08-02 17:30
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb23-30.html | vendor-advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Adobe | Acrobat Reader |
Version: 0 ≤ 23.003.20244 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:30:14.217Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb23-30.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "23.003.20244", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "datePublic": "2023-08-08T17:00:00.000Z", "descriptions": [ { "lang": "en", "value": "Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "availabilityRequirement": "NOT_DEFINED", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "confidentialityRequirement": "NOT_DEFINED", "environmentalScore": 7.8, "environmentalSeverity": "HIGH", "exploitCodeMaturity": "NOT_DEFINED", "integrityImpact": "HIGH", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "LOW", "modifiedAttackVector": "LOCAL", "modifiedAvailabilityImpact": "HIGH", "modifiedConfidentialityImpact": "HIGH", "modifiedIntegrityImpact": "HIGH", "modifiedPrivilegesRequired": "NONE", "modifiedScope": "NOT_DEFINED", "modifiedUserInteraction": "REQUIRED", "privilegesRequired": "NONE", "remediationLevel": "NOT_DEFINED", "reportConfidence": "NOT_DEFINED", "scope": "UNCHANGED", "temporalScore": 7.8, "temporalSeverity": "HIGH", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "Out-of-bounds Write (CWE-787)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-10T13:17:41.778Z", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb23-30.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "ZDI-CAN-21337: Adobe Acrobat Reader DC Font Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability" } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2023-38233", "datePublished": "2023-08-10T13:17:41.778Z", "dateReserved": "2023-07-13T16:21:52.615Z", "dateUpdated": "2024-08-02T17:30:14.217Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-38246
Vulnerability from cvelistv5
Published
2023-08-10 13:17
Modified
2024-08-02 17:39
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb23-30.html | vendor-advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Adobe | Acrobat Reader |
Version: 0 ≤ 23.003.20244 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:39:12.067Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb23-30.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "23.003.20244", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "datePublic": "2023-08-08T17:00:00.000Z", "descriptions": [ { "lang": "en", "value": "Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "availabilityRequirement": "NOT_DEFINED", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "confidentialityRequirement": "NOT_DEFINED", "environmentalScore": 7.8, "environmentalSeverity": "HIGH", "exploitCodeMaturity": "NOT_DEFINED", "integrityImpact": "HIGH", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "LOW", "modifiedAttackVector": "LOCAL", "modifiedAvailabilityImpact": "HIGH", "modifiedConfidentialityImpact": "HIGH", "modifiedIntegrityImpact": "HIGH", "modifiedPrivilegesRequired": "NONE", "modifiedScope": "NOT_DEFINED", "modifiedUserInteraction": "REQUIRED", "privilegesRequired": "NONE", "remediationLevel": "NOT_DEFINED", "reportConfidence": "NOT_DEFINED", "scope": "UNCHANGED", "temporalScore": 7.8, "temporalSeverity": "HIGH", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-824", "description": "Access of Uninitialized Pointer (CWE-824)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-10T13:17:49.592Z", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb23-30.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "Adobe Acrobat Reader DC ActiveX Control (AxAcroPDFLib.AxAcroPDF) stack-based stale pointer vulnerability" } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2023-38246", "datePublished": "2023-08-10T13:17:49.592Z", "dateReserved": "2023-07-13T16:21:52.617Z", "dateUpdated": "2024-08-02T17:39:12.067Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-38244
Vulnerability from cvelistv5
Published
2023-08-10 13:17
Modified
2024-08-02 17:30
Severity ?
EPSS score ?
Summary
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
References
▼ | URL | Tags |
---|---|---|
https://helpx.adobe.com/security/products/acrobat/apsb23-30.html | vendor-advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Adobe | Acrobat Reader |
Version: 0 ≤ 23.003.20244 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:30:14.189Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb23-30.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Acrobat Reader", "vendor": "Adobe", "versions": [ { "lessThanOrEqual": "23.003.20244", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "datePublic": "2023-08-08T17:00:00.000Z", "descriptions": [ { "lang": "en", "value": "Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "availabilityRequirement": "NOT_DEFINED", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "confidentialityRequirement": "NOT_DEFINED", "environmentalScore": 5.5, "environmentalSeverity": "MEDIUM", "exploitCodeMaturity": "NOT_DEFINED", "integrityImpact": "NONE", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "LOW", "modifiedAttackVector": "LOCAL", "modifiedAvailabilityImpact": "NONE", "modifiedConfidentialityImpact": "HIGH", "modifiedIntegrityImpact": "NONE", "modifiedPrivilegesRequired": "NONE", "modifiedScope": "NOT_DEFINED", "modifiedUserInteraction": "REQUIRED", "privilegesRequired": "NONE", "remediationLevel": "NOT_DEFINED", "reportConfidence": "NOT_DEFINED", "scope": "UNCHANGED", "temporalScore": 5.5, "temporalSeverity": "MEDIUM", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "Out-of-bounds Read (CWE-125)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-10T13:17:32.153Z", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://helpx.adobe.com/security/products/acrobat/apsb23-30.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "ZDI-CAN-21371: Adobe Acrobat Reader DC Font Parsing Out-Of-Bounds Read Information Disclosure Vulnerability" } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2023-38244", "datePublished": "2023-08-10T13:17:32.153Z", "dateReserved": "2023-07-13T16:21:52.617Z", "dateUpdated": "2024-08-02T17:30:14.189Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.