Lucene search

K
cve[email protected]CVE-2008-2992
HistoryNov 04, 2008 - 6:29 p.m.

CVE-2008-2992

2008-11-0418:29:47
CWE-119
web.nvd.nist.gov
908
In Wild
cve-2008-2992
adobe acrobat
adobe reader
buffer overflow
remote code execution

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

7.8 High

AI Score

Confidence

Low

0.972 High

EPSS

Percentile

99.8%

Stack-based buffer overflow in Adobe Acrobat and Reader 8.1.2 and earlier allows remote attackers to execute arbitrary code via a PDF file that calls the util.printf JavaScript function with a crafted format string argument, a related issue to CVE-2008-1104.

Affected configurations

NVD
Node
adobeacrobatRange≀8.1.2
OR
adobeacrobatMatch3.0
OR
adobeacrobatMatch3.1
OR
adobeacrobatMatch4.0
OR
adobeacrobatMatch4.0.5
OR
adobeacrobatMatch4.0.5a
OR
adobeacrobatMatch4.0.5c
OR
adobeacrobatMatch5.0
OR
adobeacrobatMatch5.0.5
OR
adobeacrobatMatch5.0.6
OR
adobeacrobatMatch5.0.10
OR
adobeacrobatMatch6.0
OR
adobeacrobatMatch6.0.1
OR
adobeacrobatMatch6.0.2
OR
adobeacrobatMatch6.0.3
OR
adobeacrobatMatch6.0.4
OR
adobeacrobatMatch6.0.5
OR
adobeacrobatMatch7.0
OR
adobeacrobatMatch7.0.1
OR
adobeacrobatMatch7.0.2
OR
adobeacrobatMatch7.0.3
OR
adobeacrobatMatch7.0.4
OR
adobeacrobatMatch7.0.5
OR
adobeacrobatMatch7.0.6
OR
adobeacrobatMatch7.0.7
OR
adobeacrobatMatch7.0.8
OR
adobeacrobatMatch7.0.9
OR
adobeacrobatMatch8.0
OR
adobeacrobatMatch8.1
OR
adobeacrobatMatch8.1.1
OR
adobeacrobat_readerRange≀8.1.2
OR
adobeacrobat_readerMatch3.0
OR
adobeacrobat_readerMatch4.0
OR
adobeacrobat_readerMatch4.0.5
OR
adobeacrobat_readerMatch4.0.5a
OR
adobeacrobat_readerMatch4.0.5c
OR
adobeacrobat_readerMatch4.5
OR
adobeacrobat_readerMatch5.0
OR
adobeacrobat_readerMatch5.0.5
OR
adobeacrobat_readerMatch5.0.6
OR
adobeacrobat_readerMatch5.0.7
OR
adobeacrobat_readerMatch5.0.9
OR
adobeacrobat_readerMatch5.0.10
OR
adobeacrobat_readerMatch5.0.11
OR
adobeacrobat_readerMatch5.1
OR
adobeacrobat_readerMatch6.0
OR
adobeacrobat_readerMatch6.0.1
OR
adobeacrobat_readerMatch6.0.2
OR
adobeacrobat_readerMatch6.0.3
OR
adobeacrobat_readerMatch6.0.4
OR
adobeacrobat_readerMatch6.0.5
OR
adobeacrobat_readerMatch7.0
OR
adobeacrobat_readerMatch7.0.1
OR
adobeacrobat_readerMatch7.0.2
OR
adobeacrobat_readerMatch7.0.3
OR
adobeacrobat_readerMatch7.0.4
OR
adobeacrobat_readerMatch7.0.5
OR
adobeacrobat_readerMatch7.0.6
OR
adobeacrobat_readerMatch7.0.7
OR
adobeacrobat_readerMatch7.0.8
OR
adobeacrobat_readerMatch7.0.9
OR
adobeacrobat_readerMatch8.0
OR
adobeacrobat_readerMatch8.1
OR
adobeacrobat_readerMatch8.1.1

References

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

7.8 High

AI Score

Confidence

Low

0.972 High

EPSS

Percentile

99.8%