Rapid7 Vulnerability & Exploit Database

Adobe Acrobat: APSB18-21 (CVE-2018-5012): Security Bulletin for Adobe Acrobat and Reader | APSB18-21

Free InsightVM Trial No Credit Card Necessary
Watch Demo See how it all works
Back to Search

Adobe Acrobat: APSB18-21 (CVE-2018-5012): Security Bulletin for Adobe Acrobat and Reader | APSB18-21

Severity
7
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:P)
Published
07/10/2018
Created
07/25/2018
Added
07/12/2018
Modified
03/28/2022

Description

Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Untrusted pointer dereference vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.

Solution(s)

  • adobe-acrobat-dc-upgrade-15-006-30434-macosx
  • adobe-acrobat-dc-upgrade-15-006-30434-windows
  • adobe-acrobat-dc-upgrade-18-011-20055-macosx
  • adobe-acrobat-dc-upgrade-18-011-20055-windows
  • adobe-acrobat-reader-dc-upgrade-15-006-30434-macosx
  • adobe-acrobat-reader-dc-upgrade-15-006-30434-windows
  • adobe-acrobat-reader-dc-upgrade-17-011-30096-macosx
  • adobe-acrobat-reader-dc-upgrade-17-011-30096-windows
  • adobe-acrobat-reader-dc-upgrade-18-011-20055-macosx
  • adobe-acrobat-reader-dc-upgrade-18-011-20055-windows
  • adobe-acrobat-upgrade-2017-011-30096-macosx
  • adobe-acrobat-upgrade-2017-011-30096-windows

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;