Acrobat Reader DC versions versions 2021.001.20155 (and earlier), 2020.001.30025 (and earlier) and 2017.011.30196 (and earlier) are affected by an Use After Free vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
References
Link | Resource |
---|---|
https://helpx.adobe.com/security/products/acrobat/apsb21-37.html | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
History
13 Sep 2021, 14:47
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:* |
cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:* cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:* |
08 Sep 2021, 17:23
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:* |
01 Sep 2021, 16:14
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 6.8
v3 : 7.8 |
CPE | cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:* cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:* cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:* cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:* cpe:2.3:o:apple:mac_os:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* |
|
References | (MISC) https://helpx.adobe.com/security/products/acrobat/apsb21-37.html - Vendor Advisory |
24 Aug 2021, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-08-24 18:15
Updated : 2024-02-04 21:47
NVD link : CVE-2021-28631
Mitre link : CVE-2021-28631
CVE.ORG link : CVE-2021-28631
JSON object : View
Products Affected
apple
- macos
microsoft
- windows
adobe
- acrobat_reader
- acrobat_reader_dc
- acrobat
- acrobat_dc
CWE
CWE-416
Use After Free