Acrobat Reader DC versions 2020.012.20048 (and earlier), 2020.001.30005 (and earlier) and 2017.011.30175 (and earlier) for macOS are affected by a security feature bypass that could result in dynamic library code injection by the Adobe Reader process. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Acrobat | Adobe | * | 20.001.30005 (including) |
Acrobat_dc | Adobe | * | 17.011.30175 (including) |
Acrobat_dc | Adobe | * | 20.012.20048 (including) |
Acrobat_reader | Adobe | * | 20.001.30005 (including) |
Acrobat_reader_dc | Adobe | * | 17.011.30175 (including) |
Acrobat_reader_dc | Adobe | * | 20.012.20048 (including) |
Assuming a user with a given identity, authorization is the process of determining whether that user can access a given resource, based on the user’s privileges and any permissions or other access-control specifications that apply to the resource. When access control checks are not applied consistently - or not at all - users are able to access data or perform actions that they should not be allowed to perform. This can lead to a wide range of problems, including information exposures, denial of service, and arbitrary code execution.