CVE ID | CVE-2017-3020 |
CVSS SCORE | 4.3, AV:N/AC:M/Au:N/C:P/I:N/A:N |
AFFECTED VENDORS |
Adobe |
AFFECTED PRODUCTS |
Acrobat Reader DC |
TREND MICRO CUSTOMER PROTECTION | Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID ['26491']. For further product information on the TippingPoint IPS: http://www.tippingpoint.com |
VULNERABILITY DETAILS |
The specific flaw exists within the Weblink plugin. The process does not properly validate user-supplied data which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute code under the context of the current process.
|
ADDITIONAL DETAILS |
Adobe has issued an update to correct this vulnerability. More details can be found at:
https://helpx.adobe.com/security/products/acrobat/apsb17-11.html |
DISCLOSURE TIMELINE |
|
CREDIT | Ke Liu of Tencent's Xuanwu LAB |