Lucene search

K
canvasImmunity CanvasACROBAT_JBIG
HistoryFeb 20, 2009 - 7:30 p.m.

Immunity Canvas: ACROBAT_JBIG

2009-02-2019:30:00
Immunity Canvas
exploitlist.immunityinc.com
19

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.972 High

EPSS

Percentile

99.8%

Name acrobat_jbig
CVE CVE-2009-0658 Exploit Pack
VENDOR: Adobe
Notes:
Not to be used from IE (via the HTTP Server) as memory moves around too much.

Instead, generate a PDF file and email it to your target.

This exploit requires at least 300mb of RAM on your targetโ€™s machine for the
heap spray. It does not require JavaScript to be enabled in Acrobat Reader.
This was tested on Acrobat Reader 9.0 on XP SP2/3.

VersionsAffected: Adobe Acrobat Reader 9.0/8.1.3 and lower
Repeatability:
CVE URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0658
References: http://secunia.com/advisories/33901/
CERT Advisory: http://www.kb.cert.org/vuls/id/905281
Date public: 02/20/2009
CVSS: 9.3

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.972 High

EPSS

Percentile

99.8%