CVE-2014-0568
17.09.2014, 10:55
The NtSetInformationFile system call hook feature in Adobe Reader and Acrobat 10.x before 10.1.12 and 11.x before 11.0.09 on Windows allows attackers to bypass a sandbox protection mechanism, and consequently execute native code in a privileged context, via an NTFS junction attack.Enginsight
Vendor | Product | Version |
---|---|---|
adobe | acrobat_reader | 10.0 |
adobe | acrobat_reader | 10.0.1 |
adobe | acrobat_reader | 10.0.2 |
adobe | acrobat_reader | 10.0.3 |
adobe | acrobat_reader | 10.1 |
adobe | acrobat_reader | 10.1.1 |
adobe | acrobat_reader | 10.1.2 |
adobe | acrobat_reader | 10.1.3 |
adobe | acrobat_reader | 10.1.4 |
adobe | acrobat_reader | 10.1.5 |
adobe | acrobat_reader | 10.1.6 |
adobe | acrobat_reader | 10.1.7 |
adobe | acrobat_reader | 10.1.8 |
adobe | acrobat_reader | 10.1.9 |
adobe | acrobat_reader | 10.1.10 |
adobe | acrobat_reader | 10.1.11 |
adobe | acrobat_reader | 11.0 |
adobe | acrobat_reader | 11.0.1 |
adobe | acrobat_reader | 11.0.2 |
adobe | acrobat_reader | 11.0.3 |
adobe | acrobat_reader | 11.0.4 |
adobe | acrobat_reader | 11.0.5 |
adobe | acrobat_reader | 11.0.6 |
adobe | acrobat_reader | 11.0.7 |
adobe | acrobat_reader | 11.0.8 |
adobe | acrobat | 10.0 |
adobe | acrobat | 10.0 |
adobe | acrobat | 10.0.1 |
adobe | acrobat | 10.0.1 |
adobe | acrobat | 10.0.2 |
adobe | acrobat | 10.0.3 |
adobe | acrobat | 10.1 |
adobe | acrobat | 10.1.1 |
adobe | acrobat | 10.1.2 |
adobe | acrobat | 10.1.3 |
adobe | acrobat | 10.1.4 |
adobe | acrobat | 10.1.5 |
adobe | acrobat | 10.1.6 |
adobe | acrobat | 10.1.7 |
adobe | acrobat | 10.1.8 |
adobe | acrobat | 10.1.9 |
adobe | acrobat | 10.1.10 |
adobe | acrobat | 10.1.11 |
adobe | acrobat | 11.0 |
adobe | acrobat | 11.0.1 |
adobe | acrobat | 11.0.2 |
adobe | acrobat | 11.0.3 |
adobe | acrobat | 11.0.4 |
adobe | acrobat | 11.0.5 |
adobe | acrobat | 11.0.6 |
adobe | acrobat | 11.0.7 |
adobe | acrobat | 11.0.8 |
𝑥
= Vulnerable software versions
References