
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2024-41832 is an out-of-bounds read vulnerability affecting Adobe Acrobat Reader versions 20.005.30636, 24.002.20965, 24.002.20964, 24.001.30123 and earlier. The vulnerability exists in CoolType, a font processing framework used by Adobe Acrobat Reader. This security issue was discovered and reported by Cisco Talos Intelligence Group (Talos Report, NVD).
The vulnerability is classified as CWE-125 (Out-of-bounds Read) with a CVSS v3.1 Base Score of 5.5 (Medium). The issue occurs in the processing of OpenType font files embedded within PDF documents, specifically in the handling of the gvar (glyph variations) table. The vulnerability could lead to disclosure of sensitive memory and potentially aid in bypassing security mitigations such as ASLR (NVD).
Successful exploitation of this vulnerability could lead to disclosure of sensitive memory information. An attacker could leverage this vulnerability to bypass security mitigations such as Address Space Layout Randomization (ASLR), potentially facilitating further attacks (NVD).
Adobe has released security updates to address this vulnerability. Users should update to the latest version of Adobe Acrobat Reader. The fix is available through Adobe's security bulletin (Adobe Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."