The NtSetInformationFile system call hook feature in Adobe Reader and Acrobat 10.x before 10.1.12 and 11.x before 11.0.09 on Windows allows attackers to bypass a sandbox protection mechanism, and consequently execute native code in a privileged context, via an NTFS junction attack.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Acrobat_reader | Adobe | 10.0 (including) | 10.0 (including) |
Acrobat_reader | Adobe | 10.0.1 (including) | 10.0.1 (including) |
Acrobat_reader | Adobe | 10.0.2 (including) | 10.0.2 (including) |
Acrobat_reader | Adobe | 10.0.3 (including) | 10.0.3 (including) |
Acrobat_reader | Adobe | 10.1 (including) | 10.1 (including) |
Acrobat_reader | Adobe | 10.1.1 (including) | 10.1.1 (including) |
Acrobat_reader | Adobe | 10.1.2 (including) | 10.1.2 (including) |
Acrobat_reader | Adobe | 10.1.3 (including) | 10.1.3 (including) |
Acrobat_reader | Adobe | 10.1.4 (including) | 10.1.4 (including) |
Acrobat_reader | Adobe | 10.1.5 (including) | 10.1.5 (including) |
Acrobat_reader | Adobe | 10.1.6 (including) | 10.1.6 (including) |
Acrobat_reader | Adobe | 10.1.7 (including) | 10.1.7 (including) |
Acrobat_reader | Adobe | 10.1.8 (including) | 10.1.8 (including) |
Acrobat_reader | Adobe | 10.1.9 (including) | 10.1.9 (including) |
Acrobat_reader | Adobe | 10.1.10 (including) | 10.1.10 (including) |
Acrobat_reader | Adobe | 10.1.11 (including) | 10.1.11 (including) |
Acrobat_reader | Adobe | 11.0 (including) | 11.0 (including) |
Acrobat_reader | Adobe | 11.0.1 (including) | 11.0.1 (including) |
Acrobat_reader | Adobe | 11.0.2 (including) | 11.0.2 (including) |
Acrobat_reader | Adobe | 11.0.3 (including) | 11.0.3 (including) |
Acrobat_reader | Adobe | 11.0.4 (including) | 11.0.4 (including) |
Acrobat_reader | Adobe | 11.0.5 (including) | 11.0.5 (including) |
Acrobat_reader | Adobe | 11.0.6 (including) | 11.0.6 (including) |
Acrobat_reader | Adobe | 11.0.7 (including) | 11.0.7 (including) |
Acrobat_reader | Adobe | 11.0.8 (including) | 11.0.8 (including) |
Acroread | Ubuntu | upstream | * |