Vulnerability Description
The NtSetInformationFile system call hook feature in Adobe Reader and Acrobat 10.x before 10.1.12 and 11.x before 11.0.09 on Windows allows attackers to bypass a sandbox protection mechanism, and consequently execute native code in a privileged context, via an NTFS junction attack.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Adobe | Acrobat Reader | 10.0 |
| Microsoft | Windows | All versions |
| Adobe | Acrobat | 10.0 |
References
- http://helpx.adobe.com/security/products/reader/apsb14-20.htmlPatchVendor Advisory
- http://www.securityfocus.com/bid/69828
- http://www.securitytracker.com/id/1030853
- https://code.google.com/p/google-security-research/issues/detail?id=94
- https://exchange.xforce.ibmcloud.com/vulnerabilities/96000
- http://helpx.adobe.com/security/products/reader/apsb14-20.htmlPatchVendor Advisory
- http://www.securityfocus.com/bid/69828
- http://www.securitytracker.com/id/1030853
- https://code.google.com/p/google-security-research/issues/detail?id=94
- https://exchange.xforce.ibmcloud.com/vulnerabilities/96000
FAQ
What is CVE-2014-0568?
CVE-2014-0568 is a vulnerability with a CVSS score of 10.0 (HIGH). The NtSetInformationFile system call hook feature in Adobe Reader and Acrobat 10.x before 10.1.12 and 11.x before 11.0.09 on Windows allows attackers to bypass a sandbox protection mechanism, and cons...
How severe is CVE-2014-0568?
CVE-2014-0568 has been rated HIGH with a CVSS base score of 10.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-0568?
Check the references section above for vendor advisories and patch information. Affected products include: Adobe Acrobat Reader, Microsoft Windows, Adobe Acrobat.