5.5

CVE-2022-44519

Acrobat Reader DC version 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by a use-after-free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Data is provided by the National Vulnerability Database (NVD)
AdobeAcrobat Dc SwEditioncontinuous Version >= 15.008.20082 <= 22.001.20085
   ApplemacOS Version-
   MicrosoftWindows Version-
AdobeAcrobat Reader Dc SwEditioncontinuous Version >= 15.008.20082 <= 22.001.20085
   ApplemacOS Version-
   MicrosoftWindows Version-
AdobeAcrobat SwEditionclassic Version >= 17.011.30059 <= 17.012.30205
   ApplemacOS Version-
   MicrosoftWindows Version-
AdobeAcrobat Reader SwEditionclassic Version >= 17.011.30059 <= 17.012.30205
   ApplemacOS Version-
   MicrosoftWindows Version-
AdobeAcrobat SwEditionclassic Version >= 20.001.30005 <= 20.005.30314
   MicrosoftWindows Version-
AdobeAcrobat Reader SwEditionclassic Version >= 20.001.30005 <= 20.005.30314
   MicrosoftWindows Version-
AdobeAcrobat SwEditionclassic Version >= 20.001.30005 <= 20.005.30311
   ApplemacOS Version-
AdobeAcrobat Reader SwEditionclassic Version >= 20.001.30005 <= 20.005.30311
   ApplemacOS Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.03% 0.075
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
psirt@adobe.com 5.5 1.8 3.6
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
CWE-416 Use After Free

The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory "belongs" to the code that operates on the new pointer.