CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
AI Score
Confidence
Low
EPSS
Percentile
85.9%
The NtSetInformationFile system call hook feature in Adobe Reader and Acrobat 10.x before 10.1.12 and 11.x before 11.0.09 on Windows allows attackers to bypass a sandbox protection mechanism, and consequently execute native code in a privileged context, via an NTFS junction attack.
Vendor | Product | Version | CPE |
---|---|---|---|
adobe | acrobat_reader | 10.0 | cpe:2.3:a:adobe:acrobat_reader:10.0:*:*:*:*:*:*:* |
adobe | acrobat_reader | 10.0.1 | cpe:2.3:a:adobe:acrobat_reader:10.0.1:*:*:*:*:*:*:* |
adobe | acrobat_reader | 10.0.2 | cpe:2.3:a:adobe:acrobat_reader:10.0.2:*:*:*:*:*:*:* |
adobe | acrobat_reader | 10.0.3 | cpe:2.3:a:adobe:acrobat_reader:10.0.3:*:*:*:*:*:*:* |
adobe | acrobat_reader | 10.1 | cpe:2.3:a:adobe:acrobat_reader:10.1:*:*:*:*:*:*:* |
adobe | acrobat_reader | 10.1.1 | cpe:2.3:a:adobe:acrobat_reader:10.1.1:*:*:*:*:*:*:* |
adobe | acrobat_reader | 10.1.2 | cpe:2.3:a:adobe:acrobat_reader:10.1.2:*:*:*:*:*:*:* |
adobe | acrobat_reader | 10.1.3 | cpe:2.3:a:adobe:acrobat_reader:10.1.3:*:*:*:*:*:*:* |
adobe | acrobat_reader | 10.1.4 | cpe:2.3:a:adobe:acrobat_reader:10.1.4:*:*:*:*:*:*:* |
adobe | acrobat_reader | 10.1.5 | cpe:2.3:a:adobe:acrobat_reader:10.1.5:*:*:*:*:*:*:* |