Adobe Acrobat and Reader Memory Corruption (APSB14-15: CVE-2016-1067; CVE-2016-1067; CVE-2016-1068; CVE-2016-1069)

This vulnerability is an instance of a use after free vulnerability. A constraint for exploitation of this vulnerability is that the memory area of the freed object is reused by another object. A remote attacker may exploit this vulnerability by enticing a target user to open a specially crafted PDF file.

Leave a Reply