Impact
A stack‑based buffer overflow exists in earlier Adobe Illustrator releases. The flaw allows an attacker to overwrite the call stack and execute arbitrary code, gaining full control of the application as the current user. It is a classic memory corruption weakness classified as CWE‑121. The vulnerability is only exploitable when a user opens a crafted Illustrator file, requiring user interaction to trigger execution.
Affected Systems
Adobe Illustrator versions 29.8.4, 30.1 and all earlier releases are affected. The vulnerability does not affect other Adobe products or operating systems, and only the Illustrator product family is impacted.
Risk and Exploitability
The problem has a CVSS score of 7.8, indicating a high severity. Exploit probability is very low, with an Expected Score of less than 1 percent, and the vulnerability is not currently listed in the CISA Known Exploited Vulnerabilities catalog. An attacker would need to convince (or trick) a victim to open a malicious file, after which the overflow would be triggered to gain code execution in the victim’s user context.
OpenCVE Enrichment