Acrobat Reader versions 20.005.30539, 23.008.20470 and earlier are affected by an Integer Overflow or Wraparound vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
References
Link | Resource |
---|---|
https://helpx.adobe.com/security/products/acrobat/apsb24-07.html | Patch Vendor Advisory |
https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1906 | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
History
01 Mar 2024, 23:06
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:* cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:* cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:* cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:* |
|
First Time |
Apple
Apple macos Adobe acrobat Adobe acrobat Dc Adobe acrobat Reader Dc Adobe Adobe acrobat Reader Microsoft Microsoft windows |
|
References | () https://helpx.adobe.com/security/products/acrobat/apsb24-07.html - Patch, Vendor Advisory | |
References | () https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1906 - Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
15 Feb 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
15 Feb 2024, 14:28
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-02-15 13:15
Updated : 2024-03-01 23:06
NVD link : CVE-2024-20730
Mitre link : CVE-2024-20730
JSON object : View
Products Affected
adobe
- acrobat_dc
- acrobat
- acrobat_reader
- acrobat_reader_dc
apple
- macos
microsoft
- windows
CWE
No CWE.