Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2009-2989
Modified
More InfoOfficial Page
Source-cve@mitre.org
View Known Exploited Vulnerability (KEV) details
Published At-19 Oct, 2009 | 22:30
Updated At-30 Oct, 2018 | 16:25

Integer overflow in Adobe Acrobat 9.x before 9.2, 8.x before 8.1.7, and possibly 7.x through 7.1.4 might allow attackers to execute arbitrary code via unspecified vectors.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.09.3HIGH
AV:N/AC:M/Au:N/C:C/I:C/A:C
CPE Matches

Adobe Inc.
adobe
>>acrobat>>Versions up to 9.1.3(inclusive)
cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*
Adobe Inc.
adobe
>>acrobat>>7.0
cpe:2.3:a:adobe:acrobat:7.0:*:*:*:*:*:*:*
Adobe Inc.
adobe
>>acrobat>>7.0.1
cpe:2.3:a:adobe:acrobat:7.0.1:*:*:*:*:*:*:*
Adobe Inc.
adobe
>>acrobat>>7.0.2
cpe:2.3:a:adobe:acrobat:7.0.2:*:*:*:*:*:*:*
Adobe Inc.
adobe
>>acrobat>>7.0.3
cpe:2.3:a:adobe:acrobat:7.0.3:*:*:*:*:*:*:*
Adobe Inc.
adobe
>>acrobat>>7.0.4
cpe:2.3:a:adobe:acrobat:7.0.4:*:*:*:*:*:*:*
Adobe Inc.
adobe
>>acrobat>>7.0.5
cpe:2.3:a:adobe:acrobat:7.0.5:*:*:*:*:*:*:*
Adobe Inc.
adobe
>>acrobat>>7.0.6
cpe:2.3:a:adobe:acrobat:7.0.6:*:*:*:*:*:*:*
Adobe Inc.
adobe
>>acrobat>>7.0.7
cpe:2.3:a:adobe:acrobat:7.0.7:*:*:*:*:*:*:*
Adobe Inc.
adobe
>>acrobat>>7.0.8
cpe:2.3:a:adobe:acrobat:7.0.8:*:*:*:*:*:*:*
Adobe Inc.
adobe
>>acrobat>>7.0.9
cpe:2.3:a:adobe:acrobat:7.0.9:*:*:*:*:*:*:*
Adobe Inc.
adobe
>>acrobat>>7.1.0
cpe:2.3:a:adobe:acrobat:7.1.0:*:*:*:*:*:*:*
Adobe Inc.
adobe
>>acrobat>>7.1.1
cpe:2.3:a:adobe:acrobat:7.1.1:*:*:*:*:*:*:*
Adobe Inc.
adobe
>>acrobat>>7.1.3
cpe:2.3:a:adobe:acrobat:7.1.3:*:*:*:*:*:*:*
Adobe Inc.
adobe
>>acrobat>>8.0
cpe:2.3:a:adobe:acrobat:8.0:*:*:*:*:*:*:*
Adobe Inc.
adobe
>>acrobat>>8.1
cpe:2.3:a:adobe:acrobat:8.1:*:*:*:*:*:*:*
Adobe Inc.
adobe
>>acrobat>>8.1.1
cpe:2.3:a:adobe:acrobat:8.1.1:*:*:*:*:*:*:*
Adobe Inc.
adobe
>>acrobat>>8.1.2
cpe:2.3:a:adobe:acrobat:8.1.2:*:*:*:*:*:*:*
Adobe Inc.
adobe
>>acrobat>>8.1.3
cpe:2.3:a:adobe:acrobat:8.1.3:*:*:*:*:*:*:*
Adobe Inc.
adobe
>>acrobat>>8.1.4
cpe:2.3:a:adobe:acrobat:8.1.4:*:*:*:*:*:*:*
Adobe Inc.
adobe
>>acrobat>>8.1.6
cpe:2.3:a:adobe:acrobat:8.1.6:*:*:*:*:*:*:*
Adobe Inc.
adobe
>>acrobat>>9.0
cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*
Adobe Inc.
adobe
>>acrobat>>9.1.1
cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*
Adobe Inc.
adobe
>>acrobat>>9.1.2
cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-189Primarynvd@nist.gov
Evaluator Description

Evaluator Impact

Per: http://www.adobe.com/support/security/bulletins/apsb09-15.html This update resolves an integer overflow that could potentially lead to code execution. This issue is specific to Acrobat and does not affect Adobe Reader. (CVE-2009-2989). NOTE: this issue is resolved in the Acrobat 9.2 and 8.1.7 updates.

Evaluator Solution

Per: http://www.adobe.com/support/security/bulletins/apsb09-15.html Solution Acrobat Acrobat Standard and Pro users on Windows can find the appropriate update here: http://www.adobe.com/support/downloads/product.jsp?product=1&platform=Windows. Acrobat Pro Extended users on Windows can find the appropriate update here: http://www.adobe.com/support/downloads/product.jsp?product=158&platform=Windows Acrobat 3D users on Windows can find the appropriate update here: http://www.adobe.com/support/downloads/product.jsp?product=112&platform=Windows. Acrobat Pro users on Macintosh can find the appropriate update here: http://www.adobe.com/support/downloads/product.jsp?product=1&platform=Macintosh.

Vendor Statements

References
HyperlinkSourceResource
http://securitytracker.com/id?1023007cve@mitre.org
N/A
http://www.adobe.com/support/security/bulletins/apsb09-15.htmlcve@mitre.org
Patch
Vendor Advisory
http://www.securityfocus.com/bid/36638cve@mitre.org
N/A
http://www.us-cert.gov/cas/techalerts/TA09-286B.htmlcve@mitre.org
Patch
US Government Resource
http://www.vupen.com/english/advisories/2009/2898cve@mitre.org
Patch
Vendor Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6297cve@mitre.org
N/A
Change History
0Changes found

Details not found