cve-2009-3459
Vulnerability from cvelistv5
Published
2009-10-13 10:00
Modified
2024-08-07 06:31
Severity ?
Summary
Heap-based buffer overflow in Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 allows remote attackers to execute arbitrary code via a crafted PDF file that triggers memory corruption, as exploited in the wild in October 2009. NOTE: some of these details are obtained from third party information.
References
psirt@adobe.comhttp://blogs.adobe.com/psirt/2009/10/adobe_reader_and_acrobat_issue_1.htmlVendor Advisory
psirt@adobe.comhttp://isc.sans.org/diary.html?storyid=7300
psirt@adobe.comhttp://secunia.com/advisories/36983Vendor Advisory
psirt@adobe.comhttp://securitytracker.com/id?1023007
psirt@adobe.comhttp://www.adobe.com/support/security/bulletins/apsb09-15.htmlPatch, Vendor Advisory
psirt@adobe.comhttp://www.iss.net/threats/348.html
psirt@adobe.comhttp://www.securityfocus.com/bid/36600
psirt@adobe.comhttp://www.us-cert.gov/cas/techalerts/TA09-286B.htmlUS Government Resource
psirt@adobe.comhttp://www.vupen.com/english/advisories/2009/2851Vendor Advisory
psirt@adobe.comhttp://www.vupen.com/english/advisories/2009/2898Vendor Advisory
psirt@adobe.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/53691
psirt@adobe.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6534
af854a3a-2127-422b-91ae-364da2661108http://blogs.adobe.com/psirt/2009/10/adobe_reader_and_acrobat_issue_1.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://isc.sans.org/diary.html?storyid=7300
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/36983Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1023007
af854a3a-2127-422b-91ae-364da2661108http://www.adobe.com/support/security/bulletins/apsb09-15.htmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.iss.net/threats/348.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/36600
af854a3a-2127-422b-91ae-364da2661108http://www.us-cert.gov/cas/techalerts/TA09-286B.htmlUS Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2009/2851Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2009/2898Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/53691
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6534
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T06:31:10.547Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "36983",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/36983"
          },
          {
            "name": "oval:org.mitre.oval:def:6534",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6534"
          },
          {
            "name": "TA09-286B",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT",
              "x_transferred"
            ],
            "url": "http://www.us-cert.gov/cas/techalerts/TA09-286B.html"
          },
          {
            "name": "1023007",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1023007"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.adobe.com/support/security/bulletins/apsb09-15.html"
          },
          {
            "name": "20091009 Adobe Acrobat and Acrobat Reader Remote Code Execution",
            "tags": [
              "third-party-advisory",
              "x_refsource_ISS",
              "x_transferred"
            ],
            "url": "http://www.iss.net/threats/348.html"
          },
          {
            "name": "ADV-2009-2851",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/2851"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://isc.sans.org/diary.html?storyid=7300"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://blogs.adobe.com/psirt/2009/10/adobe_reader_and_acrobat_issue_1.html"
          },
          {
            "name": "36600",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/36600"
          },
          {
            "name": "ADV-2009-2898",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/2898"
          },
          {
            "name": "adobe-reader-pdf-code-execution(53691)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53691"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-10-08T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Heap-based buffer overflow in Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 allows remote attackers to execute arbitrary code via a crafted PDF file that triggers memory corruption, as exploited in the wild in October 2009. NOTE: some of these details are obtained from third party information."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-18T12:57:01",
        "orgId": "078d4453-3bcd-4900-85e6-15281da43538",
        "shortName": "adobe"
      },
      "references": [
        {
          "name": "36983",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/36983"
        },
        {
          "name": "oval:org.mitre.oval:def:6534",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6534"
        },
        {
          "name": "TA09-286B",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT"
          ],
          "url": "http://www.us-cert.gov/cas/techalerts/TA09-286B.html"
        },
        {
          "name": "1023007",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1023007"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.adobe.com/support/security/bulletins/apsb09-15.html"
        },
        {
          "name": "20091009 Adobe Acrobat and Acrobat Reader Remote Code Execution",
          "tags": [
            "third-party-advisory",
            "x_refsource_ISS"
          ],
          "url": "http://www.iss.net/threats/348.html"
        },
        {
          "name": "ADV-2009-2851",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/2851"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://isc.sans.org/diary.html?storyid=7300"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://blogs.adobe.com/psirt/2009/10/adobe_reader_and_acrobat_issue_1.html"
        },
        {
          "name": "36600",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/36600"
        },
        {
          "name": "ADV-2009-2898",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/2898"
        },
        {
          "name": "adobe-reader-pdf-code-execution(53691)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53691"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@adobe.com",
          "ID": "CVE-2009-3459",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Heap-based buffer overflow in Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 allows remote attackers to execute arbitrary code via a crafted PDF file that triggers memory corruption, as exploited in the wild in October 2009. NOTE: some of these details are obtained from third party information."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "36983",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/36983"
            },
            {
              "name": "oval:org.mitre.oval:def:6534",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6534"
            },
            {
              "name": "TA09-286B",
              "refsource": "CERT",
              "url": "http://www.us-cert.gov/cas/techalerts/TA09-286B.html"
            },
            {
              "name": "1023007",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1023007"
            },
            {
              "name": "http://www.adobe.com/support/security/bulletins/apsb09-15.html",
              "refsource": "CONFIRM",
              "url": "http://www.adobe.com/support/security/bulletins/apsb09-15.html"
            },
            {
              "name": "20091009 Adobe Acrobat and Acrobat Reader Remote Code Execution",
              "refsource": "ISS",
              "url": "http://www.iss.net/threats/348.html"
            },
            {
              "name": "ADV-2009-2851",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/2851"
            },
            {
              "name": "http://isc.sans.org/diary.html?storyid=7300",
              "refsource": "MISC",
              "url": "http://isc.sans.org/diary.html?storyid=7300"
            },
            {
              "name": "http://blogs.adobe.com/psirt/2009/10/adobe_reader_and_acrobat_issue_1.html",
              "refsource": "CONFIRM",
              "url": "http://blogs.adobe.com/psirt/2009/10/adobe_reader_and_acrobat_issue_1.html"
            },
            {
              "name": "36600",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/36600"
            },
            {
              "name": "ADV-2009-2898",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/2898"
            },
            {
              "name": "adobe-reader-pdf-code-execution(53691)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53691"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538",
    "assignerShortName": "adobe",
    "cveId": "CVE-2009-3459",
    "datePublished": "2009-10-13T10:00:00",
    "dateReserved": "2009-09-29T00:00:00",
    "dateUpdated": "2024-08-07T06:31:10.547Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2009-3459\",\"sourceIdentifier\":\"psirt@adobe.com\",\"published\":\"2009-10-13T10:30:00.577\",\"lastModified\":\"2024-11-21T01:07:24.323\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Heap-based buffer overflow in Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 allows remote attackers to execute arbitrary code via a crafted PDF file that triggers memory corruption, as exploited in the wild in October 2009. NOTE: some of these details are obtained from third party information.\"},{\"lang\":\"es\",\"value\":\"Un Desbordamiento de b\u00fafer en la regi\u00f3n heap de la memoria en Adobe Reader y Acrobat versi\u00f3n 7.x anterior a versi\u00f3n 7.1.4, versi\u00f3n 8.x anterior a 8.1.7, y versi\u00f3n 9.x anterior a 9.2, permite a los atacantes remotos ejecutar c\u00f3digo arbitrario por medio de un archivo PDF creado que desencadena la corrupci\u00f3n de memoria, tal y como fue explotado \\\"in the wild\\\" en octubre de 2009. NOTA: algunos de estos detalles se obtienen de informaci\u00f3n de terceros.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:C/I:C/A:C\",\"baseScore\":9.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.6,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"9.1.3\",\"matchCriteriaId\":\"84209F08-D75D-4C02-94E4-5942B244E632\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"465F9134-DD86-4F13-8C39-949BE6E7389A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB041EDF-EFF8-4AA6-8D59-411975547534\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C05F6A5-0FB3-489B-9B8B-64C569C03D7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:4.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AABA4FE3-662B-4956-904D-45086E000890\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:4.0.5a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"998CD79C-458E-46A8-8261-1C40C53D9FA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:4.0.5c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0155FB0B-7FAD-4388-96C8-A8543B4FDFD9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"201F059D-33D1-4D9F-9C6F-FC8EB49E4735\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:5.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B025E795-5713-485E-8A15-EBE4451A1A46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:5.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B453FA1D-0FE9-4324-9644-E167561926C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:5.0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDEA946E-B6D2-463B-89D0-F2F37278089E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"183B5940-2310-4D2E-99F0-9792A801A442\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:6.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F8BB13E-2732-4F9E-A588-EA1C00893C8B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:6.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5FCDCBF-597B-439C-8D8B-2819FC70C567\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:6.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"440B890A-90E9-4456-B92A-856CD17F0C78\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:6.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79BD9D8D-39DA-403E-915D-E1B6A46A6BAB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:6.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8976A7DC-1314-4C4A-A7C5-AA789D2DAB9C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FECFC942-4F04-420C-A9B4-AE0C0590317F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:7.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F81817F2-1E3A-4A52-88F1-6B614A2A1F0A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:7.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFFFFF0D-A80F-4B67-BEE2-86868EF7AA37\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:7.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DC97A87-2652-4AD6-8E10-419A9AC9C245\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:7.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E1F71AE-3591-499E-B09F-AAC4E38F1CF2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:7.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D75174C-EBF9-4117-9E66-80E847012853\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:7.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69B0305A-51D3-4E09-B96C-54B0ED921DA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:7.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9762FE57-837B-4FFA-9813-AC038450EB2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:7.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0055A38C-E421-40A1-8BC7-11856A20B8F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:7.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"758CC9EE-8929-405B-A845-83BAAECCB2AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:7.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21AC1961-12F7-456F-9CE4-9AAF116CF141\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26AE76F7-D7F6-4AF2-A5C6-708B5642C288\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"749FFB51-65D4-4A4B-95F3-742440276897\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:8.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8665E53-EC1E-4B95-9064-2565BC12113E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:8.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24218FDA-F9DA-465A-B5D5-76A55C7EE04E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:8.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2C5F1C5-85CD-47B9-897F-E51D6902AF72\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:8.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0E190FF-3EBC-44AB-8072-4D964E843E8A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:8.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B95C0A99-42E4-40A9-BF61-507E4E4DC052\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37AF9870-B9F0-42D2-B2D1-4A7E569A4C73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:9.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5FF485FB-3317-4C89-B636-F22FF19B00BE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7EC46E3-77B7-4455-B3E0-A45C6B69B3DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F475858-DCE2-4C93-A51A-04718DF17593\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88687272-4CD0-42A2-B727-C322ABDE3549\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"9.0\",\"matchCriteriaId\":\"840D37C8-F30C-4A91-9B34-39AF1E4E34C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA4A65AB-75F1-4F6B-83E4-354E7D1EAE3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AD49BF0-E8BC-4716-8B13-DF39267D9303\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:4.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71FC1CDB-DF7C-45FF-973D-8C9310121B0C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:4.0.5a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C8951B8-0DF2-48C9-9EAC-9EDCCD389958\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:4.0.5c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCCCF8E6-2117-4665-AC71-8F05771CDB15\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99E14042-AF3B-4609-8CFE-6E02B3DF5CF2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"822D6CAA-4CF7-41BE-B2AC-E7CBAB6229C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:5.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73579E5C-BDB2-4F9C-BB87-E3752B9030B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:5.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A57B3C8-B127-4A52-AB08-A1B6F7830914\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:5.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F131F390-EA28-41C2-A054-42E6B070FA8E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:5.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E26DE5FE-729C-4C3A-80FB-0FAFC90A8BEB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:5.0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C85609BE-4385-4728-AC7E-4231B45A3CE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:5.0.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29BDD58D-3200-48C1-AB30-07808E029061\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC93E153-9E21-4012-BFE0-0168488FFC17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30D445D4-2B00-451B-8744-CCA9F1E1ADA7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:6.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53D60FEC-557F-456B-8F35-170078EC5C6F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:6.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51A7B617-FDB3-4F46-AF1F-F9210FB2793B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:6.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B5D145B-FD5B-430E-8E90-929B00271C44\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:6.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40E8FD46-14E2-4D92-8A99-66EC41F38CF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:6.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78BA5B02-F565-4A7F-B9FD-DD08ABF258CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:7.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E3F0A07-7021-4D04-A8F2-1BCAB474CD2A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:7.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4C1C3A0-B0DF-42E4-A8AC-D93FCB6526D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:7.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3B5B11C-6E76-4A03-AC05-840EFE2F8504\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:7.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFF8D072-305A-40B9-9E89-D98BDD951346\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:7.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEF52FAE-B6EF-457D-A61A-95B5E31CEF7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:7.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A7236C5-85F8-47C5-8A24-D5282F94D77D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:7.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"718F2E95-E221-4928-B50F-AB840BBA0E9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:7.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"123D2B4E-0D05-453C-B598-E41D43FE0E96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:7.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0109ADA4-6BA0-4299-8043-7CD60DAD6DD7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:7.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F00A8EC-10FC-42B6-BB3E-985C903B91DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:8.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98BCBFB5-72DF-4B8A-8F4C-E958B4FAFB37\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:8.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71EB6E18-5764-4916-9ECA-F4E880672217\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:8.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61151189-E24C-4AB6-BC60-B9AF720E3D4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:8.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B65F7E5-05A4-45FC-BDC2-670166535721\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"026B1CF8-28A2-415D-A240-C9DF774BF9DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FBE16943-CCD8-4A39-832F-F6ED3CF2936B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:9.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"42A1A800-D0CC-4593-A31A-EE308E63B454\"}]}]}],\"references\":[{\"url\":\"http://blogs.adobe.com/psirt/2009/10/adobe_reader_and_acrobat_issue_1.html\",\"source\":\"psirt@adobe.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://isc.sans.org/diary.html?storyid=7300\",\"source\":\"psirt@adobe.com\"},{\"url\":\"http://secunia.com/advisories/36983\",\"source\":\"psirt@adobe.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://securitytracker.com/id?1023007\",\"source\":\"psirt@adobe.com\"},{\"url\":\"http://www.adobe.com/support/security/bulletins/apsb09-15.html\",\"source\":\"psirt@adobe.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.iss.net/threats/348.html\",\"source\":\"psirt@adobe.com\"},{\"url\":\"http://www.securityfocus.com/bid/36600\",\"source\":\"psirt@adobe.com\"},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA09-286B.html\",\"source\":\"psirt@adobe.com\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/2851\",\"source\":\"psirt@adobe.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/2898\",\"source\":\"psirt@adobe.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/53691\",\"source\":\"psirt@adobe.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6534\",\"source\":\"psirt@adobe.com\"},{\"url\":\"http://blogs.adobe.com/psirt/2009/10/adobe_reader_and_acrobat_issue_1.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://isc.sans.org/diary.html?storyid=7300\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/36983\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://securitytracker.com/id?1023007\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.adobe.com/support/security/bulletins/apsb09-15.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.iss.net/threats/348.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/36600\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA09-286B.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/2851\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/2898\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/53691\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6534\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.