Lucene search

K
saintSAINT CorporationSAINT:FBEE88D561880A37F17CB8475A74DF84
HistoryMay 29, 2009 - 12:00 a.m.

Adobe Reader Javascript API getAnnots method vulnerability

2009-05-2900:00:00
SAINT Corporation
download.saintcorporation.com
12

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.959 High

EPSS

Percentile

99.3%

Added: 05/29/2009
CVE: CVE-2009-1492
BID: 34736
OSVDB: 54130

Background

Adobe Reader is free software for viewing PDF documents.

Problem

A vulnerability in the Javascript API allows command execution when a user opens a PDF file which calls the **getAnnots** method with specially crafted arguments.

Resolution

Apply one of the patches referenced in APSB09-06.

References

<http://www.kb.cert.org/vuls/id/970180&gt;

Limitations

Exploit works on Adobe Reader 8.1.3 and 9.1 and requires a user to open the exploit file in Adobe Reader.

Due to the nature of the vulnerability, the success of the exploit depends on the state of the target system’s memory.

Platforms

Linux

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.959 High

EPSS

Percentile

99.3%