9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.354 Low
EPSS
Percentile
97.1%
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the way Adobe Reader handles Compound Glyphs. It is possible for an compound glyph to reference another compound glyph. When this happens the Reader fails to correctly count the number of child glyphs. The result is that the code reads a value from outside an array of valid values. This value is used as a counter for a loop that copies memory. This could result in remote code execution under trhe context of the current user.