Lucene search

K
zdiAbdulAziz Hariri - Trend Micro Zero Day InitiativeZDI-16-537
HistoryOct 11, 2016 - 12:00 a.m.

Adobe Acrobat Pro DC SaveAs Use-After-Free Remote Code Execution Vulnerability

2016-10-1100:00:00
AbdulAziz Hariri - Trend Micro Zero Day Initiative
www.zerodayinitiative.com
19

EPSS

0.025

Percentile

90.1%

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the SaveAs menu item. The issue lies in the failure to properly validate the existence of an object prior to performing operations on it. An attacker can leverage this vulnerability to execute code under the context of the current process.