FrameMaker 2020 Update 4 (and earlier), 2022 (and earlier) are affected by a Use After Free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
References
Link | Resource |
---|---|
https://helpx.adobe.com/security/products/framemaker/apsb23-06.html | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
01 Mar 2023, 19:24
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:adobe:framemaker:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* cpe:2.3:a:adobe:framemaker:2022:*:*:*:*:*:*:* |
|
References | (MISC) https://helpx.adobe.com/security/products/framemaker/apsb23-06.html - Vendor Advisory | |
First Time |
Microsoft windows
Microsoft Adobe Adobe framemaker |
17 Feb 2023, 22:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-02-17 22:15
Updated : 2023-12-10 14:48
NVD link : CVE-2023-21584
Mitre link : CVE-2023-21584
CVE.ORG link : CVE-2023-21584
JSON object : View
Products Affected
microsoft
- windows
adobe
- framemaker
CWE
CWE-416
Use After Free