{"id":163194,"date":"2024-05-15T10:46:03","date_gmt":"2024-05-15T10:46:03","guid":{"rendered":"https:\/\/securityaffairs.com\/?p=163194"},"modified":"2024-05-15T10:46:52","modified_gmt":"2024-05-15T10:46:52","slug":"adobe-flaws-acrobat-reader","status":"publish","type":"post","link":"https:\/\/securityaffairs.com\/163194\/security\/adobe-flaws-acrobat-reader.html","title":{"rendered":"Adobe fixed multiple critical flaws in Acrobat and Reader"},"content":{"rendered":"
<\/div>\n

Adobe addressed multiple code execution vulnerabilities in several products, including Adobe Acrobat and Reader.<\/h2>\n\n\n\n

Adobe addressed multiple code execution vulnerabilities in its products, including Adobe Acrobat and Reader software<\/p>\n\n\n\n

The software giant released its Patch Tuesday updates to fix 35 security vulnerabilities 12 of these issues impact Adobe Acrobat and Reader<\/a> software.<\/p>\n\n\n\n

The arbitrary code execution issues fixed by the company includes Use After Free, Improper Input Validation, and Improper Access Control.<\/p>\n\n\n\n

Vulnerability Category<\/strong><\/gwmw><\/td>Vulnerability Impact<\/strong><\/td>Severity<\/strong><\/td>CVSS base score<\/strong><\/td>CVSS vector<\/a><\/td>CVE Number<\/strong><\/td><\/tr>
Use After Free (CWE-416<\/a>)<\/gwmw><\/td>Arbitrary code execution<\/td>Critical<\/td>7.8<\/td>CVSS:3.1\/AV:L\/AC:L\/PR:N\/UI:R\/S:U\/C:H\/I:H\/A:H<\/td>CVE-2024-30284<\/td><\/tr>
Out-of-bounds Write (CWE-787<\/a>)<\/td>Arbitrary code execution<\/td>Critical<\/td>7.8<\/td>CVSS:3.1\/AV:L\/AC:L\/PR:N\/UI:R\/S:U\/C:H\/I:H\/A:H<\/td>CVE-2024-30310<\/td><\/tr>
Use After Free (CWE-416<\/a>)<\/td>Arbitrary code execution<\/td>Critical<\/td>7.8<\/td>CVSS:3.1\/AV:L\/AC:L\/PR:N\/UI:R\/S:U\/C:H\/I:H\/A:H<\/td>CVE-2024-34094<\/td><\/tr>
Use After Free (CWE-416<\/a>)<\/td>Arbitrary code execution<\/td>Critical<\/td>7.8<\/td>CVSS:3.1\/AV:L\/AC:L\/PR:N\/UI:R\/S:U\/C:H\/I:H\/A:H<\/td>CVE-2024-34095<\/td><\/tr>
Use After Free (CWE-416<\/a>)<\/td>Arbitrary code execution<\/td>Critical<\/td>7.8<\/td>CVSS:3.1\/AV:L\/AC:L\/PR:N\/UI:R\/S:U\/C:H\/I:H\/A:H<\/td>CVE-2024-34096<\/td><\/tr>
Use After Free (CWE-416<\/a>)<\/td>Arbitrary code execution<\/td>Critical<\/td>7.8<\/td>CVSS:3.1\/AV:L\/AC:L\/PR:N\/UI:R\/S:U\/C:H\/I:H\/A:H<\/td>CVE-2024-34097<\/td><\/tr>
Improper Input Validation (CWE-20)<\/td>Arbitrary code execution<\/td>Critical<\/td>7.8<\/td>CVSS:3.1\/AV:L\/AC:L\/PR:N\/UI:R\/S:U\/C:H\/I:H\/A:H<\/td>CVE-2024-34098<\/td><\/tr>
Improper Access Control (CWE-284)<\/gwmw><\/td>Arbitrary code execution<\/td>Critical<\/td>7.8<\/td>CVSS:3.1\/AV:L\/AC:L\/PR:N\/UI:R\/S:U\/C:H\/I:H\/A:H<\/td>CVE-2024-34099<\/td><\/tr>
Use After Free (CWE-416<\/a>)<\/td>Arbitrary code execution<\/td>Critical<\/td>7.8<\/td>CVSS:3.1\/AV:L\/AC:L\/PR:N\/UI:R\/S:U\/C:H\/I:H\/A:H<\/td>CVE-2024-34100<\/td><\/tr>
Out-of-bounds Read (CWE-125<\/a>)<\/td>Memory leak<\/td>Important<\/td>5.5<\/td>CVSS:3.1\/AV:L\/AC:L\/PR:N\/UI:R\/S:U\/C:H\/I:N\/A:N<\/td>CVE-2024-30311<\/td><\/tr>
Out-of-bounds Read (CWE-125<\/a>)<\/td>Memory leak<\/td>Important<\/td>5.5<\/td>CVSS:3.1\/AV:L\/AC:L\/PR:N\/UI:R\/S:U\/C:H\/I:N\/A:N<\/td>CVE-2024-30312<\/td><\/tr>
Out-of-bounds Read (CWE-125)<\/td>Memory leak<\/td>Moderate<\/td>3.3<\/td>CVSS:3.1\/AV:L\/AC:L\/PR:N\/UI:R\/S:U\/C:L\/I:N\/A:N<\/td>CVE-2024-34101<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n

The vulnerabilities were reported by the following experts and research team:<\/p>\n\n\n\n