Heap-based buffer overflow in Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 allows remote attackers to execute arbitrary code via a crafted PDF file that triggers memory corruption, as exploited in the wild in October 2009. NOTE: some of these details are obtained from third party information.
Date Added | Due Date | Vulnerability Name | Required Action |
---|---|---|---|
N/A |
Type | Version | Base score | Base severity | Vector |
---|---|---|---|---|
Primary | 2.0 | 9.3 | HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
CWE ID | Type | Source |
---|---|---|
CWE-119 | Primary | nvd@nist.gov |
Hyperlink | Source | Resource |
---|---|---|
http://blogs.adobe.com/psirt/2009/10/adobe_reader_and_acrobat_issue_1.html | psirt@adobe.com | Vendor Advisory |
http://isc.sans.org/diary.html?storyid=7300 | psirt@adobe.com | N/A |
http://secunia.com/advisories/36983 | psirt@adobe.com | Vendor Advisory |
http://securitytracker.com/id?1023007 | psirt@adobe.com | N/A |
http://www.adobe.com/support/security/bulletins/apsb09-15.html | psirt@adobe.com | Patch Vendor Advisory |
http://www.iss.net/threats/348.html | psirt@adobe.com | N/A |
http://www.securityfocus.com/bid/36600 | psirt@adobe.com | N/A |
http://www.us-cert.gov/cas/techalerts/TA09-286B.html | psirt@adobe.com | US Government Resource |
http://www.vupen.com/english/advisories/2009/2851 | psirt@adobe.com | Vendor Advisory |
http://www.vupen.com/english/advisories/2009/2898 | psirt@adobe.com | Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/53691 | psirt@adobe.com | N/A |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6534 | psirt@adobe.com | N/A |