PDFL SDK versions 21.0.0.5 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
                
            References
                    | Link | Resource | 
|---|---|
| https://helpx.adobe.com/security/products/pdfl-sdk1/apsb24-98.html | Vendor Advisory | 
Configurations
                    Configuration 1 (hide)
| AND | 
            
            
 
  | 
    
History
                    19 Dec 2024, 17:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://helpx.adobe.com/security/products/pdfl-sdk1/apsb24-98.html - Vendor Advisory | |
| First Time | 
        
        Linux
         Adobe pdf Library Sdk Apple macos Linux linux Kernel Microsoft windows Apple Microsoft Adobe  | 
|
| CPE | cpe:2.3:a:adobe:pdf_library_sdk:*:*:*:*:*:*:*:* cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*  | 
16 Dec 2024, 17:15
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | 
        
        
  | 
|
| Summary | (en) PDFL SDK versions 21.0.0.5 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | 
10 Dec 2024, 21:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2024-12-10 21:15
Updated : 2024-12-19 17:15
NVD link : CVE-2024-49513
Mitre link : CVE-2024-49513
CVE.ORG link : CVE-2024-49513
JSON object : View
Products Affected
                apple
- macos
 
microsoft
- windows
 
adobe
- pdf_library_sdk
 
linux
- linux_kernel
 
CWE
                
                    
                        
                        CWE-787
                        
            Out-of-bounds Write
