11/10/2022 0 Comments Adobe acrobat distiller![]() ![]() ![]() An attacker can leverage this vulnerability to execute code in the context of the current process.Īdobe has issued an update to correct this vulnerability. The issue results from the lack of validating the existence of an object prior to performing operations on the object. The specific flaw exists within the processing of PostScript files. The FilePath ALLUSERSPDFOPTIONSSETTINGS by default resolves to AllUsersProfileAppDataAdobeAcrobatDistillerSettings where AllUsersProfileAppData is usually C:Documents and SettingsAll UsersApplication Data.User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Acrobat Pro DC. ![]() February 12th, 2019 Adobe Acrobat Distiller PostScript File Parsing grestore Use-After-Free Remote Code Execution Vulnerability ZDI-19-210ħ.8, (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |