ID CVE-2009-1862
Summary Unspecified vulnerability in Adobe Reader and Acrobat 9.x through 9.1.2, and Adobe Flash Player 9.x through 9.0.159.0 and 10.x through 10.0.22.87, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via (1) a crafted Flash application in a .pdf file or (2) a crafted .swf file, related to authplay.dll, as exploited in the wild in July 2009. Per: http://www.kb.cert.org/vuls/id/259425 "Adobe Flash is a widely deployed multimedia platform typically used to provide content in web sites. Adobe Flash Player, Reader, Acrobat, and other Adobe products include Flash support. Adobe Flash Player contains a code execution vulnerability. An attacker may be able to trigger this vulnerability by convincing a user to open a specially crafted Flash (SWF) file. The SWF file could be hosted or embedded in a web page or contained in a Portable Document Format (PDF) file. If an attacker can take control of a website or web server, trusted sites may exploit this vulnerability. This vulnerability affects Adobe Flash versions 9.0.159.0 and 10.0.22.87 and earlier 9.x and 10.x versions. Adobe Reader 9, Acrobat 9, and other Adobe products (including Photoshop CS3, PhotoShop Lightroom, Freehand MX, Fireworks) provide Flash support independent of Flash Player. As of 2009-07-22, Adobe Reader 9.1.2 includes Flash 9.0.155.0, which is likely vulnerable to issues addressed by Flash 9.0.159.0"
References
Vulnerable Configurations
  • cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:flash_player:9.0.124.0:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:flash_player:9.0.124.0:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:flash_player:9.0.155.0:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:flash_player:9.0.155.0:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:flash_player:9.0.159.0:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:flash_player:9.0.159.0:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:flash_player:9.125.0:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:flash_player:9.125.0:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:flash_player:10.0.0.584:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:flash_player:10.0.0.584:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:flash_player:10.0.12.10:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:flash_player:10.0.12.10:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:flash_player:10.0.12.36:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:flash_player:10.0.12.36:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:flash_player:10.0.22.87:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:flash_player:10.0.22.87:*:*:*:*:*:*:*
CVSS
Base: 9.3 (as of 16-09-2009 - 05:31)
Impact:
Exploitability:
CWE CWE-94
CAPEC
  • Code Injection
    An adversary exploits a weakness in input validation on the target to inject new code into that which is currently executing. This differs from code inclusion in that code inclusion involves the addition or replacement of a reference to a code file, which is subsequently loaded by the target and used as part of the code of some application.
  • Leverage Executable Code in Non-Executable Files
    An attack of this type exploits a system's trust in configuration and resource files. When the executable loads the resource (such as an image file or configuration file) the attacker has modified the file to either execute malicious code directly or manipulate the target process (e.g. application server) to execute based on the malicious configuration parameters. Since systems are increasingly interrelated mashing up resources from local and remote sources the possibility of this attack occurring is high.
  • Manipulating User-Controlled Variables
    This attack targets user controlled variables (DEBUG=1, PHP Globals, and So Forth). An attacker can override environment variables leveraging user-supplied, untrusted query variables directly used on the application server without any data sanitization. In extreme cases, the attacker can change variables controlling the business logic of the application. For instance, in languages like PHP, a number of poorly set default configurations may allow the user to override variables.
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:N/AC:M/Au:N/C:C/I:C/A:C
redhat via4
rpms
  • flash-plugin-0:10.0.32.18-2.el5
  • flash-plugin-0:9.0.246.0-2.el3.with.oss
  • flash-plugin-0:9.0.246.0-2.el4
refmap via4
apple
  • APPLE-SA-2009-09-10-1
  • APPLE-SA-2009-09-10-2
bid 35759
cert-vn VU#259425
confirm
gentoo GLSA-200908-04
misc
secunia
  • 36193
  • 36374
  • 36701
sunalert 266108
saint via4
bid 35759
description Adobe Flash Player authplay.dll vulnerability
id misc_flash
osvdb 56282
title flash_authplay
type client
Last major update 16-09-2009 - 05:31
Published 23-07-2009 - 20:30
Last modified 16-09-2009 - 05:31
Back to Top