This vulnerability allowed an attacker to execute arbitrary code on the system by crafting a maliciously crafted image that can be inflicted on the system. This issue was resolved in this version.
CVE-2018-5534 A buffer overflow was discovered in OpenType Font Format (OTF) software that could allow an attacker to execute arbitrary code on the system. This issue was resolved in this version.
CVE-2018-5533 A heap buffer overflow was discovered in Open Type Font (OTF) software that could allow an attacker to execute arbitrary code on the system. This issue was resolved in this version.
CVE-2018-5532 A stack overflow was discovered in Open Type Font (OTF) software that could allow an attacker to execute arbitrary code on the system. This issue was resolved in this version.
CVE-2018-5531 A use after free was discovered in Open Type Font (OTF) software that could allow an attacker to execute arbitrary code on the system. This issue was resolved in this version.
CVE-2018-5530 A buffer overflow was discovered in Open Type Font (OTF) software that could allow an attacker to execute arbitrary code on the system. This issue was resolved in this version.
CVE-2018-5529 A heap buffer overflow was discovered in Open Type Font (OTF) software that could allow an attacker to execute arbitrary code on the system. This issue was resolved in this version.
CVE
Vulnerability description br
CVE-2018-5534 A buffer overflow was discovered in OpenType Font Format (OTF) software that could allow an attacker to execute arbitrary code on the system. This issue was resolved in this version.
CVE-2018-5533 A heap buffer overflow was discovered in Open Type Font (OTF) software that could allow an attacker to execute arbitrary code on the system. This issue was resolved in this version.
CVE-2018-5532 A stack overflow was discovered in Open Type Font (OTF) software that could allow an attacker to execute arbitrary code on the system. This issue was resolved in this version.
CVE-2018-5531 A use after free was discovered in Open Type Font (OTF) software that could allow an attacker to execute arbitrary code on the system. This issue was resolved in this version.
Vendor Information
Adobe Systems Inc.
Timeline
Published on: 10/14/2022 12:15:00 UTC
Last modified on: 10/15/2022 02:09:00 UTC