9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.971 High
EPSS
Percentile
99.7%
Use-after-free vulnerability in the Doc.media.newPlayer method in Multimedia.api in Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, allows remote attackers to execute arbitrary code via a crafted PDF file using ZLib compressed streams, as exploited in the wild in December 2009.
Recent assessments:
Assessed Attacker Value: 0
Assessed Attacker Value: 0Assessed Attacker Value: 0
blogs.adobe.com/psirt/2009/12/new_adobe_reader_and_acrobat_v.html
contagiodump.blogspot.com/2009/12/virustotal-httpwww.html
lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html
osvdb.org/60980
secunia.com/advisories/37690
secunia.com/advisories/38138
secunia.com/advisories/38215
www.adobe.com/support/security/advisories/apsa09-07.html
www.adobe.com/support/security/bulletins/apsb10-02.html
www.kb.cert.org/vuls/id/508357
www.metasploit.com/redmine/projects/framework/repository/revisions/7881/entry/modules/exploits/windows/fileformat/adobe_media_newplayer.rb
www.redhat.com/support/errata/RHSA-2010-0060.html
www.securityfocus.com/bid/37331
www.shadowserver.org/wiki/pmwiki.php/Calendar/20091214
www.symantec.com/connect/blogs/zero-day-xmas-present
www.us-cert.gov/cas/techalerts/TA10-013A.html
www.vupen.com/english/advisories/2009/3518
www.vupen.com/english/advisories/2010/0103
bugzilla.redhat.com/show_bug.cgi?id=547799
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4324
exchange.xforce.ibmcloud.com/vulnerabilities/54747
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6795