CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
AI Score
Confidence
Low
EPSS
Percentile
99.9%
Heap-based buffer overflow in Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 allows remote attackers to execute arbitrary code via a crafted PDF file that triggers memory corruption, as exploited in the wild in October 2009. NOTE: some of these details are obtained from third party information.
Vendor | Product | Version | CPE |
---|---|---|---|
adobe | acrobat | 5.0 | cpe:/a:adobe:acrobat:5.0::: |
adobe | acrobat | 5.0.5 | cpe:/a:adobe:acrobat:5.0.5::: |
adobe | acrobat | 9.1 | cpe:/a:adobe:acrobat:9.1::: |
adobe | acrobat | 4.0.5a | cpe:/a:adobe:acrobat:4.0.5a::: |
adobe | acrobat | 7.1.3 | cpe:/a:adobe:acrobat:7.1.3::: |
adobe | acrobat | 8.1.2 | cpe:/a:adobe:acrobat:8.1.2::: |
adobe | acrobat | 7.0.8 | cpe:/a:adobe:acrobat:7.0.8::: |
adobe | acrobat | 6.0.5 | cpe:/a:adobe:acrobat:6.0.5::: |
adobe | acrobat | 8.1.6 | cpe:/a:adobe:acrobat:8.1.6::: |
adobe | acrobat | 9.1.1 | cpe:/a:adobe:acrobat:9.1.1::: |
blogs.adobe.com/psirt/2009/10/adobe_reader_and_acrobat_issue_1.html
isc.sans.org/diary.html?storyid=7300
secunia.com/advisories/36983
securitytracker.com/id?1023007
www.adobe.com/support/security/bulletins/apsb09-15.html
www.iss.net/threats/348.html
www.securityfocus.com/bid/36600
www.us-cert.gov/cas/techalerts/TA09-286B.html
www.vupen.com/english/advisories/2009/2851
www.vupen.com/english/advisories/2009/2898
exchange.xforce.ibmcloud.com/vulnerabilities/53691
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6534