Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a Use After Free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
References
Link | Resource |
---|---|
https://helpx.adobe.com/security/products/acrobat/apsb21-55.html | Vendor Advisory |
https://helpx.adobe.com/security/products/acrobat/apsb21-55.html | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
History
21 Nov 2024, 06:20
Type | Values Removed | Values Added |
---|---|---|
References | () https://helpx.adobe.com/security/products/acrobat/apsb21-55.html - Vendor Advisory |
12 Sep 2023, 14:38
Type | Values Removed | Values Added |
---|---|---|
First Time |
Apple
Adobe acrobat Reader Adobe Microsoft windows Adobe acrobat Reader Dc Adobe acrobat Microsoft Adobe acrobat Dc Apple macos |
|
References | (MISC) https://helpx.adobe.com/security/products/acrobat/apsb21-55.html - Vendor Advisory | |
CPE | cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:* cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:* cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:* |
06 Sep 2023, 14:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-09-06 14:15
Updated : 2024-11-21 06:20
NVD link : CVE-2021-39859
Mitre link : CVE-2021-39859
CVE.ORG link : CVE-2021-39859
JSON object : View
Products Affected
adobe
- acrobat
- acrobat_reader
- acrobat_dc
- acrobat_reader_dc
microsoft
- windows
apple
- macos
CWE
CWE-416
Use After Free