![]() ![]() Foxit PDF Editor 11.5 and all previous 11.x versions, 10.9 and earlier.Acrobat 2020 Classic 2020 20.004.30017 and earlier versions in Windows & macOS.Acrobat DC Continuous 21.007.20099 and earlier versions in macOS.Acrobat DC Continuous 21.007.20099 and earlier versions in Windows.The exploitation of this issue requires user interaction in that a victim must open a malicious file. Foxit has also released a security update to fix CVE-2021-44708.ĬVE-2021-44708 is a heap overflow vulnerability due to the insecure handling of a maliciously crafted file, potentially resulting in arbitrary code execution in the context of the current user. Foxit’s PDF Editor uses the Solid Framework for the conversion of PDF files to other file formats, and is therefore, also impacted by this vulnerability. In this blog, we present our analysis of CVE-2021-44708, a heap-based buffer overflow vulnerability in Adobe Acrobat Pro DC. Adobe uses the Solid Framework for the conversion of PDF files to Microsoft Office files in Adobe Acrobat. These five vulnerabilities existed in the Adobe Acrobat Pro DC Solid Framework. In January 2022, Adobe released a security update for vulnerabilities in Adobe Acrobat and Reader.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |