CVE-2009-3459
Vulnerability from cvelistv5
Published
2009-10-13 10:00
Modified
2024-08-07 06:31
Severity ?
EPSS score ?
Summary
Heap-based buffer overflow in Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 allows remote attackers to execute arbitrary code via a crafted PDF file that triggers memory corruption, as exploited in the wild in October 2009. NOTE: some of these details are obtained from third party information.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T06:31:10.547Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "36983", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/36983" }, { "name": "oval:org.mitre.oval:def:6534", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6534" }, { "name": "TA09-286B", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA09-286B.html" }, { "name": "1023007", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1023007" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb09-15.html" }, { "name": "20091009 Adobe Acrobat and Acrobat Reader Remote Code Execution", "tags": [ "third-party-advisory", "x_refsource_ISS", "x_transferred" ], "url": "http://www.iss.net/threats/348.html" }, { "name": "ADV-2009-2851", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/2851" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://isc.sans.org/diary.html?storyid=7300" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://blogs.adobe.com/psirt/2009/10/adobe_reader_and_acrobat_issue_1.html" }, { "name": "36600", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/36600" }, { "name": "ADV-2009-2898", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/2898" }, { "name": "adobe-reader-pdf-code-execution(53691)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53691" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-10-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 allows remote attackers to execute arbitrary code via a crafted PDF file that triggers memory corruption, as exploited in the wild in October 2009. NOTE: some of these details are obtained from third party information." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "36983", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/36983" }, { "name": "oval:org.mitre.oval:def:6534", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6534" }, { "name": "TA09-286B", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA09-286B.html" }, { "name": "1023007", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1023007" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb09-15.html" }, { "name": "20091009 Adobe Acrobat and Acrobat Reader Remote Code Execution", "tags": [ "third-party-advisory", "x_refsource_ISS" ], "url": "http://www.iss.net/threats/348.html" }, { "name": "ADV-2009-2851", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/2851" }, { "tags": [ "x_refsource_MISC" ], "url": "http://isc.sans.org/diary.html?storyid=7300" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://blogs.adobe.com/psirt/2009/10/adobe_reader_and_acrobat_issue_1.html" }, { "name": "36600", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/36600" }, { "name": "ADV-2009-2898", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/2898" }, { "name": "adobe-reader-pdf-code-execution(53691)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53691" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2009-3459", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Heap-based buffer overflow in Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 allows remote attackers to execute arbitrary code via a crafted PDF file that triggers memory corruption, as exploited in the wild in October 2009. NOTE: some of these details are obtained from third party information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "36983", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/36983" }, { "name": "oval:org.mitre.oval:def:6534", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6534" }, { "name": "TA09-286B", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA09-286B.html" }, { "name": "1023007", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1023007" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb09-15.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb09-15.html" }, { "name": "20091009 Adobe Acrobat and Acrobat Reader Remote Code Execution", "refsource": "ISS", "url": "http://www.iss.net/threats/348.html" }, { "name": "ADV-2009-2851", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/2851" }, { "name": "http://isc.sans.org/diary.html?storyid=7300", "refsource": "MISC", "url": "http://isc.sans.org/diary.html?storyid=7300" }, { "name": "http://blogs.adobe.com/psirt/2009/10/adobe_reader_and_acrobat_issue_1.html", "refsource": "CONFIRM", "url": "http://blogs.adobe.com/psirt/2009/10/adobe_reader_and_acrobat_issue_1.html" }, { "name": "36600", "refsource": "BID", "url": "http://www.securityfocus.com/bid/36600" }, { "name": "ADV-2009-2898", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/2898" }, { "name": "adobe-reader-pdf-code-execution(53691)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53691" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2009-3459", "datePublished": "2009-10-13T10:00:00", "dateReserved": "2009-09-29T00:00:00", "dateUpdated": "2024-08-07T06:31:10.547Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2009-3459\",\"sourceIdentifier\":\"psirt@adobe.com\",\"published\":\"2009-10-13T10:30:00.577\",\"lastModified\":\"2024-11-21T01:07:24.323\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Heap-based buffer overflow in Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 allows remote attackers to execute arbitrary code via a crafted PDF file that triggers memory corruption, as exploited in the wild in October 2009. NOTE: some of these details are obtained from third party information.\"},{\"lang\":\"es\",\"value\":\"Un Desbordamiento de b\u00fafer en la regi\u00f3n heap de la memoria en Adobe Reader y Acrobat versi\u00f3n 7.x anterior a versi\u00f3n 7.1.4, versi\u00f3n 8.x anterior a 8.1.7, y versi\u00f3n 9.x anterior a 9.2, permite a los atacantes remotos ejecutar c\u00f3digo arbitrario por medio de un archivo PDF creado que desencadena la corrupci\u00f3n de memoria, tal y como fue explotado \\\"in the wild\\\" en octubre de 2009. NOTA: algunos de estos detalles se obtienen de informaci\u00f3n de terceros.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:C/I:C/A:C\",\"baseScore\":9.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.6,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"9.1.3\",\"matchCriteriaId\":\"84209F08-D75D-4C02-94E4-5942B244E632\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"465F9134-DD86-4F13-8C39-949BE6E7389A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB041EDF-EFF8-4AA6-8D59-411975547534\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C05F6A5-0FB3-489B-9B8B-64C569C03D7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:4.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AABA4FE3-662B-4956-904D-45086E000890\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:4.0.5a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"998CD79C-458E-46A8-8261-1C40C53D9FA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:4.0.5c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0155FB0B-7FAD-4388-96C8-A8543B4FDFD9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"201F059D-33D1-4D9F-9C6F-FC8EB49E4735\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:5.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B025E795-5713-485E-8A15-EBE4451A1A46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:5.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B453FA1D-0FE9-4324-9644-E167561926C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:5.0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDEA946E-B6D2-463B-89D0-F2F37278089E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"183B5940-2310-4D2E-99F0-9792A801A442\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:6.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F8BB13E-2732-4F9E-A588-EA1C00893C8B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:6.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5FCDCBF-597B-439C-8D8B-2819FC70C567\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:6.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"440B890A-90E9-4456-B92A-856CD17F0C78\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:6.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79BD9D8D-39DA-403E-915D-E1B6A46A6BAB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:6.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8976A7DC-1314-4C4A-A7C5-AA789D2DAB9C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FECFC942-4F04-420C-A9B4-AE0C0590317F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:7.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F81817F2-1E3A-4A52-88F1-6B614A2A1F0A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:7.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFFFFF0D-A80F-4B67-BEE2-86868EF7AA37\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:7.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DC97A87-2652-4AD6-8E10-419A9AC9C245\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:7.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E1F71AE-3591-499E-B09F-AAC4E38F1CF2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:7.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D75174C-EBF9-4117-9E66-80E847012853\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:7.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69B0305A-51D3-4E09-B96C-54B0ED921DA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:7.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9762FE57-837B-4FFA-9813-AC038450EB2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:7.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0055A38C-E421-40A1-8BC7-11856A20B8F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:7.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"758CC9EE-8929-405B-A845-83BAAECCB2AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:7.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21AC1961-12F7-456F-9CE4-9AAF116CF141\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26AE76F7-D7F6-4AF2-A5C6-708B5642C288\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"749FFB51-65D4-4A4B-95F3-742440276897\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:8.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8665E53-EC1E-4B95-9064-2565BC12113E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:8.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24218FDA-F9DA-465A-B5D5-76A55C7EE04E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:8.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2C5F1C5-85CD-47B9-897F-E51D6902AF72\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:8.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0E190FF-3EBC-44AB-8072-4D964E843E8A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:8.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B95C0A99-42E4-40A9-BF61-507E4E4DC052\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37AF9870-B9F0-42D2-B2D1-4A7E569A4C73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:9.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5FF485FB-3317-4C89-B636-F22FF19B00BE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7EC46E3-77B7-4455-B3E0-A45C6B69B3DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F475858-DCE2-4C93-A51A-04718DF17593\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88687272-4CD0-42A2-B727-C322ABDE3549\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"9.0\",\"matchCriteriaId\":\"840D37C8-F30C-4A91-9B34-39AF1E4E34C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA4A65AB-75F1-4F6B-83E4-354E7D1EAE3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AD49BF0-E8BC-4716-8B13-DF39267D9303\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:4.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71FC1CDB-DF7C-45FF-973D-8C9310121B0C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:4.0.5a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C8951B8-0DF2-48C9-9EAC-9EDCCD389958\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:4.0.5c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCCCF8E6-2117-4665-AC71-8F05771CDB15\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99E14042-AF3B-4609-8CFE-6E02B3DF5CF2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"822D6CAA-4CF7-41BE-B2AC-E7CBAB6229C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:5.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73579E5C-BDB2-4F9C-BB87-E3752B9030B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:5.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A57B3C8-B127-4A52-AB08-A1B6F7830914\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:5.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F131F390-EA28-41C2-A054-42E6B070FA8E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:5.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E26DE5FE-729C-4C3A-80FB-0FAFC90A8BEB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:5.0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C85609BE-4385-4728-AC7E-4231B45A3CE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:5.0.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29BDD58D-3200-48C1-AB30-07808E029061\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC93E153-9E21-4012-BFE0-0168488FFC17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30D445D4-2B00-451B-8744-CCA9F1E1ADA7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:6.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53D60FEC-557F-456B-8F35-170078EC5C6F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:6.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51A7B617-FDB3-4F46-AF1F-F9210FB2793B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:6.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B5D145B-FD5B-430E-8E90-929B00271C44\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:6.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40E8FD46-14E2-4D92-8A99-66EC41F38CF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:6.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78BA5B02-F565-4A7F-B9FD-DD08ABF258CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:7.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E3F0A07-7021-4D04-A8F2-1BCAB474CD2A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:7.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4C1C3A0-B0DF-42E4-A8AC-D93FCB6526D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:7.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3B5B11C-6E76-4A03-AC05-840EFE2F8504\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:7.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFF8D072-305A-40B9-9E89-D98BDD951346\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:7.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEF52FAE-B6EF-457D-A61A-95B5E31CEF7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:7.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A7236C5-85F8-47C5-8A24-D5282F94D77D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:7.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"718F2E95-E221-4928-B50F-AB840BBA0E9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:7.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"123D2B4E-0D05-453C-B598-E41D43FE0E96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:7.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0109ADA4-6BA0-4299-8043-7CD60DAD6DD7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:7.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F00A8EC-10FC-42B6-BB3E-985C903B91DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:8.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98BCBFB5-72DF-4B8A-8F4C-E958B4FAFB37\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:8.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71EB6E18-5764-4916-9ECA-F4E880672217\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:8.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61151189-E24C-4AB6-BC60-B9AF720E3D4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:8.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B65F7E5-05A4-45FC-BDC2-670166535721\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"026B1CF8-28A2-415D-A240-C9DF774BF9DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FBE16943-CCD8-4A39-832F-F6ED3CF2936B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:9.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"42A1A800-D0CC-4593-A31A-EE308E63B454\"}]}]}],\"references\":[{\"url\":\"http://blogs.adobe.com/psirt/2009/10/adobe_reader_and_acrobat_issue_1.html\",\"source\":\"psirt@adobe.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://isc.sans.org/diary.html?storyid=7300\",\"source\":\"psirt@adobe.com\"},{\"url\":\"http://secunia.com/advisories/36983\",\"source\":\"psirt@adobe.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://securitytracker.com/id?1023007\",\"source\":\"psirt@adobe.com\"},{\"url\":\"http://www.adobe.com/support/security/bulletins/apsb09-15.html\",\"source\":\"psirt@adobe.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.iss.net/threats/348.html\",\"source\":\"psirt@adobe.com\"},{\"url\":\"http://www.securityfocus.com/bid/36600\",\"source\":\"psirt@adobe.com\"},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA09-286B.html\",\"source\":\"psirt@adobe.com\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/2851\",\"source\":\"psirt@adobe.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/2898\",\"source\":\"psirt@adobe.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/53691\",\"source\":\"psirt@adobe.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6534\",\"source\":\"psirt@adobe.com\"},{\"url\":\"http://blogs.adobe.com/psirt/2009/10/adobe_reader_and_acrobat_issue_1.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://isc.sans.org/diary.html?storyid=7300\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/36983\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://securitytracker.com/id?1023007\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.adobe.com/support/security/bulletins/apsb09-15.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.iss.net/threats/348.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/36600\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA09-286B.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/2851\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/2898\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/53691\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6534\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.