← Back to CVEs
CVE-2011-4369
N/ADescription
Unspecified vulnerability in the PRC component in Adobe Reader and Acrobat 9.x before 9.4.7 on Windows, Adobe Reader and Acrobat 9.x through 9.4.6 on Mac OS X, Adobe Reader and Acrobat 10.x through 10.1.1 on Windows and Mac OS X, and Adobe Reader 9.x through 9.4.6 on UNIX allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, as exploited in the wild in December 2011.
CVE Details
CVSS v3.1 ScoreN/A
Published12/16/2011
Last Modified4/11/2025
Sourcenvd
Honeypot Sightings0
Affected Products
adobe:acrobatadobe:acrobat_readerapple:mac_os_xmicrosoft:windowsunix:unix
References
http://www.adobe.com/support/security/bulletins/apsb11-30.html(psirt@adobe.com)
http://www.adobe.com/support/security/bulletins/apsb12-01.html(psirt@adobe.com)
http://www.redhat.com/support/errata/RHSA-2012-0011.html(psirt@adobe.com)
http://www.securityfocus.com/bid/51092(psirt@adobe.com)
http://www.us-cert.gov/cas/techalerts/TA11-350A.html(psirt@adobe.com)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14865(psirt@adobe.com)
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00019.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00020.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.adobe.com/support/security/bulletins/apsb11-30.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.adobe.com/support/security/bulletins/apsb12-01.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2012-0011.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/51092(af854a3a-2127-422b-91ae-364da2661108)
http://www.us-cert.gov/cas/techalerts/TA11-350A.html(af854a3a-2127-422b-91ae-364da2661108)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14865(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.