{"containers":{"cna":{"affected":[{"product":"Acrobat Reader","vendor":"Adobe","versions":[{"lessThanOrEqual":"2020.013.20074","status":"affected","version":"unspecified","versionType":"custom"},{"lessThanOrEqual":"2020.001.30018","status":"affected","version":"unspecified","versionType":"custom"},{"lessThanOrEqual":"2017.011.30188","status":"affected","version":"unspecified","versionType":"custom"},{"lessThanOrEqual":"None","status":"affected","version":"unspecified","versionType":"custom"}]}],"datePublic":"2021-02-09T00:00:00.000Z","descriptions":[{"lang":"en","value":"Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are affected by a heap-based buffer overflow vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-122","description":"Heap-based Buffer Overflow (CWE-122)","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2021-02-11T19:42:20.000Z","orgId":"078d4453-3bcd-4900-85e6-15281da43538","shortName":"adobe"},"references":[{"tags":["x_refsource_MISC"],"url":"https://helpx.adobe.com/security/products/acrobat/apsb21-09.html"}],"source":{"discovery":"EXTERNAL"},"title":"Acrobat Reader DC Heap-based Buffer Overflow Vulnerability Could Lead To Arbitrary Code Execution","x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"psirt@adobe.com","DATE_PUBLIC":"2021-02-09T23:00:00.000Z","ID":"CVE-2021-21017","STATE":"PUBLIC","TITLE":"Acrobat Reader DC Heap-based Buffer Overflow Vulnerability Could Lead To Arbitrary Code Execution"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Acrobat Reader","version":{"version_data":[{"version_affected":"<=","version_value":"2020.013.20074"},{"version_affected":"<=","version_value":"2020.001.30018"},{"version_affected":"<=","version_value":"2017.011.30188"},{"version_affected":"<=","version_value":"None"}]}}]},"vendor_name":"Adobe"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are affected by a heap-based buffer overflow vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."}]},"impact":{"cvss":{"attackComplexity":"None","attackVector":"None","availabilityImpact":"None","baseScore":8.8,"baseSeverity":"High","confidentialityImpact":"None","integrityImpact":"None","privilegesRequired":"None","scope":"None","userInteraction":"None","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Heap-based Buffer Overflow (CWE-122)"}]}]},"references":{"reference_data":[{"name":"https://helpx.adobe.com/security/products/acrobat/apsb21-09.html","refsource":"MISC","url":"https://helpx.adobe.com/security/products/acrobat/apsb21-09.html"}]},"source":{"discovery":"EXTERNAL"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T17:53:23.127Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://helpx.adobe.com/security/products/acrobat/apsb21-09.html"}]},{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2021-21017","role":"CISA Coordinator","options":[{"Exploitation":"active"},{"Automatable":"no"},{"Technical Impact":"total"}],"version":"2.0.3","timestamp":"2025-02-04T21:28:57.359205Z"}}},{"other":{"type":"kev","content":{"dateAdded":"2021-11-03","reference":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-21017"}}}],"references":[{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-21017","tags":["government-resource"]}],"timeline":[{"time":"2021-11-03T00:00:00.000Z","lang":"en","value":"CVE-2021-21017 added to CISA KEV"}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-10-21T23:35:28.186Z"}}]},"cveMetadata":{"assignerOrgId":"078d4453-3bcd-4900-85e6-15281da43538","assignerShortName":"adobe","cveId":"CVE-2021-21017","datePublished":"2021-02-11T19:42:20.225Z","dateReserved":"2020-12-18T00:00:00.000Z","dateUpdated":"2025-10-21T23:35:28.186Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}