Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/hacksysteam/CVE-2023-21608

Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit
https://github.com/hacksysteam/CVE-2023-21608

adobe adobe-reader aslr-bypass cfg-bypass cve-2023-21608 dep-bypass exploit rce use-after-free

Last synced: 3 months ago
JSON representation

Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit

Awesome Lists containing this project

README

        

# CVE-2023-21608

[![Twitter Follow](https://img.shields.io/twitter/follow/HackSysTeam?style=social)](https://twitter.com/HackSysTeam)
[![Mastodon Follow](https://img.shields.io/mastodon/follow/109291325205105061?domain=https%3A%2F%2Finfosec.exchange&style=social)](https://infosec.exchange/@hacksysteam)
[![Discord Server](https://dcbadge.vercel.app/api/server/ns32uNhaq7?style=flat)](https://discord.com/invite/ns32uNhaq7)

This bug was `Use after Free` which was caused during `resetForm` operation while handling object memory references.

## Blog

- [Adobe Acrobat Reader - resetForm - CAgg UaF - RCE Exploit - CVE-2023-21608](https://hacksys.io/blogs/adobe-reader-resetform-cagg-rce-cve-2023-21608)

## Advisory

- [CVE-2023-21608](https://hacksys.io/advisories/HI-2022-006)

## Demo

[![Adobe Acrobat Reader DC - UaF - Remote Code Execution - CVE-2023-21608](https://img.youtube.com/vi/cguBkC0opXk/0.jpg)](https://www.youtube.com/watch?v=cguBkC0opXk)