Lucene search

K
cve[email protected]CVE-2011-2439
HistorySep 15, 2011 - 12:26 p.m.

CVE-2011-2439

2011-09-1512:26:49
CWE-399
web.nvd.nist.gov
40
cve-2011-2439
adobe
reader
acrobat
memory leakage
vulnerability
nvd
arbitrary code
execution

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

7.8 High

AI Score

Confidence

High

0.017 Low

EPSS

Percentile

88.1%

Adobe Reader and Acrobat 8.x before 8.3.1, 9.x before 9.4.6, and 10.x before 10.1.1 allow attackers to execute arbitrary code via unspecified vectors, related to a β€œmemory leakage condition vulnerability.”

Affected configurations

NVD
Node
adobeacrobat_readerMatch8.0
OR
adobeacrobat_readerMatch8.1
OR
adobeacrobat_readerMatch8.1.1
OR
adobeacrobat_readerMatch8.1.2
OR
adobeacrobat_readerMatch8.1.3
OR
adobeacrobat_readerMatch8.1.4
OR
adobeacrobat_readerMatch8.1.5
OR
adobeacrobat_readerMatch8.1.6
OR
adobeacrobat_readerMatch8.1.7
OR
adobeacrobat_readerMatch8.2
OR
adobeacrobat_readerMatch8.2.1
OR
adobeacrobat_readerMatch8.2.2
OR
adobeacrobat_readerMatch8.2.3
OR
adobeacrobat_readerMatch8.2.4
OR
adobeacrobat_readerMatch8.2.6
OR
adobeacrobat_readerMatch8.3
OR
adobeacrobat_readerMatch9.0
OR
adobeacrobat_readerMatch9.1
OR
adobeacrobat_readerMatch9.1.1
OR
adobeacrobat_readerMatch9.1.2
OR
adobeacrobat_readerMatch9.1.3
OR
adobeacrobat_readerMatch9.2
OR
adobeacrobat_readerMatch9.3
OR
adobeacrobat_readerMatch9.3.1
OR
adobeacrobat_readerMatch9.3.2
OR
adobeacrobat_readerMatch9.3.3
OR
adobeacrobat_readerMatch9.3.4
OR
adobeacrobat_readerMatch9.4
OR
adobeacrobat_readerMatch9.4.1
OR
adobeacrobat_readerMatch9.4.2
OR
adobeacrobat_readerMatch9.4.3
OR
adobeacrobat_readerMatch9.4.4
OR
adobeacrobat_readerMatch10.0
OR
adobeacrobat_readerMatch10.0.1
OR
adobeacrobat_readerMatch10.0.2
OR
adobeacrobat_readerMatch10.0.3
Node
adobeacrobatMatch8.0
OR
adobeacrobatMatch8.1
OR
adobeacrobatMatch8.1.1
OR
adobeacrobatMatch8.1.2
OR
adobeacrobatMatch8.1.3
OR
adobeacrobatMatch8.1.4
OR
adobeacrobatMatch8.1.5
OR
adobeacrobatMatch8.1.6
OR
adobeacrobatMatch8.1.7
OR
adobeacrobatMatch8.2
OR
adobeacrobatMatch8.2.1
OR
adobeacrobatMatch8.2.2
OR
adobeacrobatMatch8.2.3
OR
adobeacrobatMatch8.2.4
OR
adobeacrobatMatch8.2.5
OR
adobeacrobatMatch8.2.6
OR
adobeacrobatMatch9.0
OR
adobeacrobatMatch9.1
OR
adobeacrobatMatch9.1.1
OR
adobeacrobatMatch9.1.2
OR
adobeacrobatMatch9.1.3
OR
adobeacrobatMatch9.2
OR
adobeacrobatMatch9.3
OR
adobeacrobatMatch9.3.1
OR
adobeacrobatMatch9.3.2
OR
adobeacrobatMatch9.3.3
OR
adobeacrobatMatch9.3.4
OR
adobeacrobatMatch9.4
OR
adobeacrobatMatch9.4.1
OR
adobeacrobatMatch9.4.2
OR
adobeacrobatMatch9.4.3
OR
adobeacrobatMatch9.4.4
OR
adobeacrobatMatch9.4.5
OR
adobeacrobatMatch10.0
OR
adobeacrobatMatch10.0.1
OR
adobeacrobatMatch10.0.2
OR
adobeacrobatMatch10.0.3
OR
adobeacrobatMatch10.1

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

7.8 High

AI Score

Confidence

High

0.017 Low

EPSS

Percentile

88.1%