Adobe behebt Acrobat Reader-Zero-Day mit öffentlichem PoC-Exploit

Teilen:

A cybersecurity researcher is urging users to upgrade Adobe Acrobat Reader after a fix was released yesterday for a remote code execution zero-day with a public in-the-wild proof-of-concept exploit.

The flaw is tracked as CVE-2024-41869 and is a critical use after free vulnerability that could lead to remote code execution when opening a specially crafted PDF document.

A “use after free” bug is when a program tries to access data in a memory location that has already been freed or released. This causes unexpected behavior, such as a program crashing or freezing.

However, if a threat actor is able to store malicious code in that memory location, and the program subsequently accesses it, it could be used to execute malicious code on the targeted device.

The flaw has now been fixed in the latest  Acrobat Reader and Adobe Acrobat versions.

PoC exploit discovered in June

The Acrobat Reader zero-day was discovered in June through EXPMON, a sandbox-based platform created by cybersecurity researcher Haifei Li to detect advanced exploits such as zero-days or hard-to-detect (unknown) exploits.

“I created EXPMON because I noticed that there were no sandbox-based detection and analysis systems specifically focusing on detecting threats from an exploit or vulnerability perspective,” Li told BleepingComputer.

ADVERTISING

“All the other systems do detection from a malware perspective. The exploit/vulnerability perspective is much needed if you want to go more advanced (or, early) detection.”

“For example, if no malware is dropped or executed due to certain conditions, or if the attack does not use any malware at all, those systems would miss such threats. Exploits operate quite differently from malware, so a different approach is needed to detect them.”

The zero-day was discovered after a large number of samples from a public source were submitted to EXPMON for analysis. These samples included a PDF containing a proof-of-concept exploit that caused a crash.

While the PoC exploit is a work in progress and contains no malicious payloads, it was confirmed to exploit a “user after free” bug, which could be used for remote code execution.

After Li disclosed the flaw to Adobe, a security update was released in August. However, the update did not fix the flaw and could still be triggered after closing various dialogs.

“We tested the (exactly the same) sample on the “patched” Adobe Reader version, it displayed additional dialogs, but if the user clicked/closed those dialogs, the app still crashed! Same UAF bug!,” tweeted the EXPMON X account.

EXPMON tweet

Yesterday, Adobe released a new security update that fixes the bug, now tracked as CVE-2024-41869.

ADVERTISING

Li will be releasing details on how the bug was detected on EXPMON’s blog and further technical information in an upcoming Check Point Research report.

Update 9/18/24: Adobe has now updated the APSB24-57 and APSB24-70 security bulletins to note that a proof-of-concept exploit exists in the wild.

“Adobe is aware that CVE-2024-39383 has a known proof-of-concept that could cause Adobe Acrobat and Reader to crash. Adobe is not aware of this issue being exploited in the wild,” reads the updated advisories.

Lawrence Abrams

Kommentar verfassen

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert

lade-bild
London, GB
11:16 pm, Juni 23, 2025
Wetter-Symbol 17°C
L: 15° | H: 17°
broken clouds
Luftfeuchtigkeit: 58 %
Druck: 1015 mb
Wind: 8 mph WNW
Windböe: 15 mph
UV-Index: 0
Niederschlag: 0 mm
Wolken: 54%
Regen Chance: 0%
Sichtbarkeit: 10 km
Sonnenaufgang: 4:43 am
Sonnenuntergang: 9:21 pm
TäglichStündlich
Tägliche VorhersageStündliche Vorhersage
Tomorrow 10:00 pm
Wetter-Symbol
15° | 17°°C 0 mm 0% 14 mph 76 % 1015 mb 0 mm/h
Mi. Juni 25 10:00 pm
Wetter-Symbol
16° | 28°°C 0.21 mm 21% 10 mph 86 % 1013 mb 0 mm/h
Do. Juni 26 10:00 pm
Wetter-Symbol
17° | 24°°C 1 mm 100% 17 mph 94 % 1018 mb 0 mm/h
Fr. Juni 27 10:00 pm
Wetter-Symbol
15° | 27°°C 0 mm 0% 15 mph 71 % 1021 mb 0 mm/h
Sa. Juni 28 10:00 pm
Wetter-Symbol
17° | 29°°C 0.2 mm 20% 12 mph 85 % 1025 mb 0 mm/h
Tomorrow 1:00 am
Wetter-Symbol
14° | 16°°C 0 mm 0% 10 mph 61 % 1015 mb 0 mm/h
Tomorrow 4:00 am
Wetter-Symbol
13° | 14°°C 0 mm 0% 9 mph 70 % 1014 mb 0 mm/h
Tomorrow 7:00 am
Wetter-Symbol
16° | 16°°C 0 mm 0% 11 mph 76 % 1014 mb 0 mm/h
Tomorrow 10:00 am
Wetter-Symbol
18° | 18°°C 0 mm 0% 12 mph 72 % 1013 mb 0 mm/h
Tomorrow 1:00 pm
Wetter-Symbol
20° | 20°°C 0 mm 0% 14 mph 71 % 1013 mb 0 mm/h
Tomorrow 4:00 pm
Wetter-Symbol
23° | 23°°C 0 mm 0% 12 mph 57 % 1011 mb 0 mm/h
Tomorrow 7:00 pm
Wetter-Symbol
24° | 24°°C 0 mm 0% 12 mph 49 % 1012 mb 0 mm/h
Tomorrow 10:00 pm
Wetter-Symbol
20° | 20°°C 0 mm 0% 9 mph 68 % 1013 mb 0 mm/h
Name Preis24H (%)
Bitcoin(BTC)
€90,909.21
4.09%
Ethereum(ETH)
€2,056.86
6.56%
Fesseln(USDT)
€0.87
0.02%
XRP(XRP)
€1.83
5.78%
Solana(SOL)
€124.14
8.88%
USDC(USDC)
€0.87
0.01%
Dogecoin(DOGE)
€0.139600
7.85%
Shiba Inu(SHIB)
€0.000010
8.72%
Pepe(PEPE)
€0.000009
10.17%
Nach oben scrollen