Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2008-2992
Analyzed
Known KEV
More InfoOfficial Page
Source-cve@mitre.org
View Known Exploited Vulnerability (KEV) details
Published At-04 Nov, 2008 | 18:29
Updated At-07 Mar, 2025 | 14:22

Stack-based buffer overflow in Adobe Acrobat and Reader 8.1.2 and earlier allows remote attackers to execute arbitrary code via a PDF file that calls the util.printf JavaScript function with a crafted format string argument, a related issue to CVE-2008-1104.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
2022-03-032022-03-24Adobe Reader and Acrobat Input Validation VulnerabilityApply updates per vendor instructions.
Metrics
TypeVersionBase scoreBase severityVector
Primary3.17.8HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Secondary3.17.8HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Primary2.09.3HIGH
AV:N/AC:M/Au:N/C:C/I:C/A:C
CPE Matches

Adobe Inc.
adobe
>>acrobat>>Versions up to 8.1.2(inclusive)
cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*
Adobe Inc.
adobe
>>acrobat_reader>>Versions up to 8.1.2(inclusive)
cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*
Oracle Corporation
oracle
>>solaris>>10
cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-787Primarynvd@nist.gov
CWE-787Secondary134c704f-9b21-4f2e-91b3-4a467353bcc0
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://download.oracle.com/sunalerts/1019937.1.htmlcve@mitre.org
Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00002.htmlcve@mitre.org
Mailing List
Third Party Advisory
http://osvdb.org/49520cve@mitre.org
Broken Link
http://secunia.com/advisories/29773cve@mitre.org
Broken Link
Vendor Advisory
http://secunia.com/advisories/32700cve@mitre.org
Broken Link
Vendor Advisory
http://secunia.com/advisories/32872cve@mitre.org
Broken Link
Vendor Advisory
http://secunia.com/advisories/35163cve@mitre.org
Broken Link
Vendor Advisory
http://secunia.com/secunia_research/2008-14/cve@mitre.org
Broken Link
Vendor Advisory
http://securityreason.com/securityalert/4549cve@mitre.org
Broken Link
Exploit
http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=800801cve@mitre.org
Broken Link
http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=909609cve@mitre.org
Broken Link
http://www.adobe.com/support/security/bulletins/apsb08-19.htmlcve@mitre.org
Broken Link
Patch
Vendor Advisory
http://www.coresecurity.com/content/adobe-reader-buffer-overflowcve@mitre.org
Third Party Advisory
http://www.kb.cert.org/vuls/id/593409cve@mitre.org
Third Party Advisory
US Government Resource
http://www.redhat.com/support/errata/RHSA-2008-0974.htmlcve@mitre.org
Broken Link
Patch
http://www.securityfocus.com/archive/1/498027/100/0/threadedcve@mitre.org
Broken Link
Third Party Advisory
VDB Entry
http://www.securityfocus.com/archive/1/498032/100/0/threadedcve@mitre.org
Broken Link
Third Party Advisory
VDB Entry
http://www.securityfocus.com/archive/1/498055/100/0/threadedcve@mitre.org
Broken Link
Third Party Advisory
VDB Entry
http://www.securityfocus.com/bid/30035cve@mitre.org
Broken Link
Third Party Advisory
VDB Entry
http://www.securityfocus.com/bid/32091cve@mitre.org
Broken Link
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1021140cve@mitre.org
Broken Link
Third Party Advisory
VDB Entry
http://www.us-cert.gov/cas/techalerts/TA08-309A.htmlcve@mitre.org
Broken Link
Third Party Advisory
US Government Resource
http://www.vupen.com/english/advisories/2008/3001cve@mitre.org
Broken Link
Vendor Advisory
http://www.vupen.com/english/advisories/2009/0098cve@mitre.org
Broken Link
Vendor Advisory
http://www.zerodayinitiative.com/advisories/ZDI-08-072/cve@mitre.org
Third Party Advisory
VDB Entry
https://www.exploit-db.com/exploits/6994cve@mitre.org
Third Party Advisory
VDB Entry
https://www.exploit-db.com/exploits/7006cve@mitre.org
Exploit
Third Party Advisory
VDB Entry
http://download.oracle.com/sunalerts/1019937.1.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00002.htmlaf854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
http://osvdb.org/49520af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/29773af854a3a-2127-422b-91ae-364da2661108
Broken Link
Vendor Advisory
http://secunia.com/advisories/32700af854a3a-2127-422b-91ae-364da2661108
Broken Link
Vendor Advisory
http://secunia.com/advisories/32872af854a3a-2127-422b-91ae-364da2661108
Broken Link
Vendor Advisory
http://secunia.com/advisories/35163af854a3a-2127-422b-91ae-364da2661108
Broken Link
Vendor Advisory
http://secunia.com/secunia_research/2008-14/af854a3a-2127-422b-91ae-364da2661108
Broken Link
Vendor Advisory
http://securityreason.com/securityalert/4549af854a3a-2127-422b-91ae-364da2661108
Broken Link
Exploit
http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=800801af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=909609af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.adobe.com/support/security/bulletins/apsb08-19.htmlaf854a3a-2127-422b-91ae-364da2661108
Broken Link
Patch
Vendor Advisory
http://www.coresecurity.com/content/adobe-reader-buffer-overflowaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.kb.cert.org/vuls/id/593409af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
US Government Resource
http://www.redhat.com/support/errata/RHSA-2008-0974.htmlaf854a3a-2127-422b-91ae-364da2661108
Broken Link
Patch
http://www.securityfocus.com/archive/1/498027/100/0/threadedaf854a3a-2127-422b-91ae-364da2661108
Broken Link
Third Party Advisory
VDB Entry
http://www.securityfocus.com/archive/1/498032/100/0/threadedaf854a3a-2127-422b-91ae-364da2661108
Broken Link
Third Party Advisory
VDB Entry
http://www.securityfocus.com/archive/1/498055/100/0/threadedaf854a3a-2127-422b-91ae-364da2661108
Broken Link
Third Party Advisory
VDB Entry
http://www.securityfocus.com/bid/30035af854a3a-2127-422b-91ae-364da2661108
Broken Link
Third Party Advisory
VDB Entry
http://www.securityfocus.com/bid/32091af854a3a-2127-422b-91ae-364da2661108
Broken Link
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1021140af854a3a-2127-422b-91ae-364da2661108
Broken Link
Third Party Advisory
VDB Entry
http://www.us-cert.gov/cas/techalerts/TA08-309A.htmlaf854a3a-2127-422b-91ae-364da2661108
Broken Link
Third Party Advisory
US Government Resource
http://www.vupen.com/english/advisories/2008/3001af854a3a-2127-422b-91ae-364da2661108
Broken Link
Vendor Advisory
http://www.vupen.com/english/advisories/2009/0098af854a3a-2127-422b-91ae-364da2661108
Broken Link
Vendor Advisory
http://www.zerodayinitiative.com/advisories/ZDI-08-072/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
VDB Entry
https://www.exploit-db.com/exploits/6994af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
VDB Entry
https://www.exploit-db.com/exploits/7006af854a3a-2127-422b-91ae-364da2661108
Exploit
Third Party Advisory
VDB Entry
Change History
0Changes found

Details not found