Arbitrary code execution vulnerability in Adobe Acrobat and Reader products via crafted JPEG 2000 dataID: oval:org.secpod.oval:def:32632 | Date: (C)2016-01-21 (M)2023-01-06 |
Class: VULNERABILITY | Family: windows |
The host is installed with Adobe Reader or Acrobat before 11.0.14, Acrobat or Acrobat Reader DC Classic before 15.006.30119 or Acrobat or Acrobat Reader DC Continuous before 15.010.20056 and is prone to an arbitrary code execution vulnerability. A flaw is present in the applications, which fail to handle a crafted JPEG 2000 data. Successful exploitation allows attackers to execute arbitrary code or cause a denial of service (memory corruption).
Platform: |
Microsoft Windows Server 2022 |
Microsoft Windows 11 |
Microsoft Windows Server 2019 |
Microsoft Windows Server 2016 |
Microsoft Windows 7 |
Microsoft Windows 8 |
Microsoft Windows Server 2003 |
Microsoft Windows Server 2008 |
Microsoft Windows Server 2008 R2 |
Microsoft Windows Server 2012 |
Microsoft Windows Vista |
Microsoft Windows XP |
Microsoft Windows 8.1 |
Microsoft Windows 10 |
Microsoft Windows Server 2012 R2 |
Product: |
Adobe Acrobat |
Adobe Acrobat DC Classic |
Adobe Acrobat DC Continuous |
Adobe Reader |
Adobe Acrobat Reader DC Classic |
Adobe Acrobat Reader DC Continuous |