CVE-2009-3459 (GCVE-0-2009-3459)

Vulnerability from cvelistv5 – Published: 2009-10-13 10:00 – Updated: 2024-08-07 06:31
VLAI?
Summary
Heap-based buffer overflow in Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 allows remote attackers to execute arbitrary code via a crafted PDF file that triggers memory corruption, as exploited in the wild in October 2009. NOTE: some of these details are obtained from third party information.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T06:31:10.547Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "36983",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/36983"
          },
          {
            "name": "oval:org.mitre.oval:def:6534",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6534"
          },
          {
            "name": "TA09-286B",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT",
              "x_transferred"
            ],
            "url": "http://www.us-cert.gov/cas/techalerts/TA09-286B.html"
          },
          {
            "name": "1023007",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1023007"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.adobe.com/support/security/bulletins/apsb09-15.html"
          },
          {
            "name": "20091009 Adobe Acrobat and Acrobat Reader Remote Code Execution",
            "tags": [
              "third-party-advisory",
              "x_refsource_ISS",
              "x_transferred"
            ],
            "url": "http://www.iss.net/threats/348.html"
          },
          {
            "name": "ADV-2009-2851",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/2851"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://isc.sans.org/diary.html?storyid=7300"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://blogs.adobe.com/psirt/2009/10/adobe_reader_and_acrobat_issue_1.html"
          },
          {
            "name": "36600",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/36600"
          },
          {
            "name": "ADV-2009-2898",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/2898"
          },
          {
            "name": "adobe-reader-pdf-code-execution(53691)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53691"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-10-08T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Heap-based buffer overflow in Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 allows remote attackers to execute arbitrary code via a crafted PDF file that triggers memory corruption, as exploited in the wild in October 2009. NOTE: some of these details are obtained from third party information."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-18T12:57:01",
        "orgId": "078d4453-3bcd-4900-85e6-15281da43538",
        "shortName": "adobe"
      },
      "references": [
        {
          "name": "36983",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/36983"
        },
        {
          "name": "oval:org.mitre.oval:def:6534",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6534"
        },
        {
          "name": "TA09-286B",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT"
          ],
          "url": "http://www.us-cert.gov/cas/techalerts/TA09-286B.html"
        },
        {
          "name": "1023007",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1023007"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.adobe.com/support/security/bulletins/apsb09-15.html"
        },
        {
          "name": "20091009 Adobe Acrobat and Acrobat Reader Remote Code Execution",
          "tags": [
            "third-party-advisory",
            "x_refsource_ISS"
          ],
          "url": "http://www.iss.net/threats/348.html"
        },
        {
          "name": "ADV-2009-2851",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/2851"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://isc.sans.org/diary.html?storyid=7300"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://blogs.adobe.com/psirt/2009/10/adobe_reader_and_acrobat_issue_1.html"
        },
        {
          "name": "36600",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/36600"
        },
        {
          "name": "ADV-2009-2898",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/2898"
        },
        {
          "name": "adobe-reader-pdf-code-execution(53691)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53691"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@adobe.com",
          "ID": "CVE-2009-3459",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Heap-based buffer overflow in Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 allows remote attackers to execute arbitrary code via a crafted PDF file that triggers memory corruption, as exploited in the wild in October 2009. NOTE: some of these details are obtained from third party information."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "36983",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/36983"
            },
            {
              "name": "oval:org.mitre.oval:def:6534",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6534"
            },
            {
              "name": "TA09-286B",
              "refsource": "CERT",
              "url": "http://www.us-cert.gov/cas/techalerts/TA09-286B.html"
            },
            {
              "name": "1023007",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1023007"
            },
            {
              "name": "http://www.adobe.com/support/security/bulletins/apsb09-15.html",
              "refsource": "CONFIRM",
              "url": "http://www.adobe.com/support/security/bulletins/apsb09-15.html"
            },
            {
              "name": "20091009 Adobe Acrobat and Acrobat Reader Remote Code Execution",
              "refsource": "ISS",
              "url": "http://www.iss.net/threats/348.html"
            },
            {
              "name": "ADV-2009-2851",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/2851"
            },
            {
              "name": "http://isc.sans.org/diary.html?storyid=7300",
              "refsource": "MISC",
              "url": "http://isc.sans.org/diary.html?storyid=7300"
            },
            {
              "name": "http://blogs.adobe.com/psirt/2009/10/adobe_reader_and_acrobat_issue_1.html",
              "refsource": "CONFIRM",
              "url": "http://blogs.adobe.com/psirt/2009/10/adobe_reader_and_acrobat_issue_1.html"
            },
            {
              "name": "36600",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/36600"
            },
            {
              "name": "ADV-2009-2898",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/2898"
            },
            {
              "name": "adobe-reader-pdf-code-execution(53691)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53691"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538",
    "assignerShortName": "adobe",
    "cveId": "CVE-2009-3459",
    "datePublished": "2009-10-13T10:00:00",
    "dateReserved": "2009-09-29T00:00:00",
    "dateUpdated": "2024-08-07T06:31:10.547Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"9.1.3\", \"matchCriteriaId\": \"84209F08-D75D-4C02-94E4-5942B244E632\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat:3.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"465F9134-DD86-4F13-8C39-949BE6E7389A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat:3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BB041EDF-EFF8-4AA6-8D59-411975547534\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat:4.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4C05F6A5-0FB3-489B-9B8B-64C569C03D7A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat:4.0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AABA4FE3-662B-4956-904D-45086E000890\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat:4.0.5a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"998CD79C-458E-46A8-8261-1C40C53D9FA5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat:4.0.5c:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0155FB0B-7FAD-4388-96C8-A8543B4FDFD9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat:5.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"201F059D-33D1-4D9F-9C6F-FC8EB49E4735\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat:5.0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B025E795-5713-485E-8A15-EBE4451A1A46\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat:5.0.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B453FA1D-0FE9-4324-9644-E167561926C2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat:5.0.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FDEA946E-B6D2-463B-89D0-F2F37278089E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat:6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"183B5940-2310-4D2E-99F0-9792A801A442\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat:6.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4F8BB13E-2732-4F9E-A588-EA1C00893C8B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat:6.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E5FCDCBF-597B-439C-8D8B-2819FC70C567\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat:6.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"440B890A-90E9-4456-B92A-856CD17F0C78\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat:6.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"79BD9D8D-39DA-403E-915D-E1B6A46A6BAB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat:6.0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8976A7DC-1314-4C4A-A7C5-AA789D2DAB9C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat:7.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FECFC942-4F04-420C-A9B4-AE0C0590317F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat:7.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F81817F2-1E3A-4A52-88F1-6B614A2A1F0A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat:7.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CFFFFF0D-A80F-4B67-BEE2-86868EF7AA37\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat:7.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1DC97A87-2652-4AD6-8E10-419A9AC9C245\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat:7.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3E1F71AE-3591-499E-B09F-AAC4E38F1CF2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat:7.0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2D75174C-EBF9-4117-9E66-80E847012853\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat:7.0.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"69B0305A-51D3-4E09-B96C-54B0ED921DA3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat:7.0.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9762FE57-837B-4FFA-9813-AC038450EB2B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat:7.0.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0055A38C-E421-40A1-8BC7-11856A20B8F0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat:7.0.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"758CC9EE-8929-405B-A845-83BAAECCB2AD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat:7.1.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"21AC1961-12F7-456F-9CE4-9AAF116CF141\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat:8.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"26AE76F7-D7F6-4AF2-A5C6-708B5642C288\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat:8.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"749FFB51-65D4-4A4B-95F3-742440276897\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat:8.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C8665E53-EC1E-4B95-9064-2565BC12113E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat:8.1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"24218FDA-F9DA-465A-B5D5-76A55C7EE04E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat:8.1.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E2C5F1C5-85CD-47B9-897F-E51D6902AF72\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat:8.1.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E0E190FF-3EBC-44AB-8072-4D964E843E8A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat:8.1.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B95C0A99-42E4-40A9-BF61-507E4E4DC052\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat:9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"37AF9870-B9F0-42D2-B2D1-4A7E569A4C73\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat:9.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5FF485FB-3317-4C89-B636-F22FF19B00BE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C7EC46E3-77B7-4455-B3E0-A45C6B69B3DC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4F475858-DCE2-4C93-A51A-04718DF17593\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"88687272-4CD0-42A2-B727-C322ABDE3549\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"9.0\", \"matchCriteriaId\": \"840D37C8-F30C-4A91-9B34-39AF1E4E34C8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:reader:3.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DA4A65AB-75F1-4F6B-83E4-354E7D1EAE3C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:reader:4.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5AD49BF0-E8BC-4716-8B13-DF39267D9303\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:reader:4.0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"71FC1CDB-DF7C-45FF-973D-8C9310121B0C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:reader:4.0.5a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5C8951B8-0DF2-48C9-9EAC-9EDCCD389958\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:reader:4.0.5c:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DCCCF8E6-2117-4665-AC71-8F05771CDB15\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:reader:4.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"99E14042-AF3B-4609-8CFE-6E02B3DF5CF2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:reader:5.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"822D6CAA-4CF7-41BE-B2AC-E7CBAB6229C9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:reader:5.0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"73579E5C-BDB2-4F9C-BB87-E3752B9030B7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:reader:5.0.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8A57B3C8-B127-4A52-AB08-A1B6F7830914\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:reader:5.0.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F131F390-EA28-41C2-A054-42E6B070FA8E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:reader:5.0.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E26DE5FE-729C-4C3A-80FB-0FAFC90A8BEB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:reader:5.0.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C85609BE-4385-4728-AC7E-4231B45A3CE1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:reader:5.0.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"29BDD58D-3200-48C1-AB30-07808E029061\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:reader:5.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FC93E153-9E21-4012-BFE0-0168488FFC17\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:reader:6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"30D445D4-2B00-451B-8744-CCA9F1E1ADA7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:reader:6.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"53D60FEC-557F-456B-8F35-170078EC5C6F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:reader:6.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"51A7B617-FDB3-4F46-AF1F-F9210FB2793B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:reader:6.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4B5D145B-FD5B-430E-8E90-929B00271C44\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:reader:6.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"40E8FD46-14E2-4D92-8A99-66EC41F38CF7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:reader:6.0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"78BA5B02-F565-4A7F-B9FD-DD08ABF258CE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:reader:7.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7E3F0A07-7021-4D04-A8F2-1BCAB474CD2A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:reader:7.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B4C1C3A0-B0DF-42E4-A8AC-D93FCB6526D9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:reader:7.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B3B5B11C-6E76-4A03-AC05-840EFE2F8504\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:reader:7.0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CFF8D072-305A-40B9-9E89-D98BDD951346\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:reader:7.0.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DEF52FAE-B6EF-457D-A61A-95B5E31CEF7D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:reader:7.0.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0A7236C5-85F8-47C5-8A24-D5282F94D77D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:reader:7.0.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"718F2E95-E221-4928-B50F-AB840BBA0E9F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:reader:7.1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"123D2B4E-0D05-453C-B598-E41D43FE0E96\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:reader:7.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0109ADA4-6BA0-4299-8043-7CD60DAD6DD7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:reader:7.1.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1F00A8EC-10FC-42B6-BB3E-985C903B91DC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:reader:8.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"98BCBFB5-72DF-4B8A-8F4C-E958B4FAFB37\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:reader:8.1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"71EB6E18-5764-4916-9ECA-F4E880672217\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:reader:8.1.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"61151189-E24C-4AB6-BC60-B9AF720E3D4B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:reader:8.1.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1B65F7E5-05A4-45FC-BDC2-670166535721\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:reader:9.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"026B1CF8-28A2-415D-A240-C9DF774BF9DD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:reader:9.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FBE16943-CCD8-4A39-832F-F6ED3CF2936B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:reader:9.1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"42A1A800-D0CC-4593-A31A-EE308E63B454\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Heap-based buffer overflow in Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 allows remote attackers to execute arbitrary code via a crafted PDF file that triggers memory corruption, as exploited in the wild in October 2009. NOTE: some of these details are obtained from third party information.\"}, {\"lang\": \"es\", \"value\": \"Un Desbordamiento de b\\u00fafer en la regi\\u00f3n heap de la memoria en Adobe Reader y Acrobat versi\\u00f3n 7.x anterior a versi\\u00f3n 7.1.4, versi\\u00f3n 8.x anterior a 8.1.7, y versi\\u00f3n 9.x anterior a 9.2, permite a los atacantes remotos ejecutar c\\u00f3digo arbitrario por medio de un archivo PDF creado que desencadena la corrupci\\u00f3n de memoria, tal y como fue explotado \\\"in the wild\\\" en octubre de 2009. NOTA: algunos de estos detalles se obtienen de informaci\\u00f3n de terceros.\"}]",
      "id": "CVE-2009-3459",
      "lastModified": "2024-11-21T01:07:24.323",
      "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:C/I:C/A:C\", \"baseScore\": 9.3, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 8.6, \"impactScore\": 10.0, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}",
      "published": "2009-10-13T10:30:00.577",
      "references": "[{\"url\": \"http://blogs.adobe.com/psirt/2009/10/adobe_reader_and_acrobat_issue_1.html\", \"source\": \"psirt@adobe.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://isc.sans.org/diary.html?storyid=7300\", \"source\": \"psirt@adobe.com\"}, {\"url\": \"http://secunia.com/advisories/36983\", \"source\": \"psirt@adobe.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://securitytracker.com/id?1023007\", \"source\": \"psirt@adobe.com\"}, {\"url\": \"http://www.adobe.com/support/security/bulletins/apsb09-15.html\", \"source\": \"psirt@adobe.com\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www.iss.net/threats/348.html\", \"source\": \"psirt@adobe.com\"}, {\"url\": \"http://www.securityfocus.com/bid/36600\", \"source\": \"psirt@adobe.com\"}, {\"url\": \"http://www.us-cert.gov/cas/techalerts/TA09-286B.html\", \"source\": \"psirt@adobe.com\", \"tags\": [\"US Government Resource\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2009/2851\", \"source\": \"psirt@adobe.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2009/2898\", \"source\": \"psirt@adobe.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/53691\", \"source\": \"psirt@adobe.com\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6534\", \"source\": \"psirt@adobe.com\"}, {\"url\": \"http://blogs.adobe.com/psirt/2009/10/adobe_reader_and_acrobat_issue_1.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://isc.sans.org/diary.html?storyid=7300\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/36983\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://securitytracker.com/id?1023007\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.adobe.com/support/security/bulletins/apsb09-15.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www.iss.net/threats/348.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/36600\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.us-cert.gov/cas/techalerts/TA09-286B.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"US Government Resource\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2009/2851\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2009/2898\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/53691\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6534\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
      "sourceIdentifier": "psirt@adobe.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-119\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2009-3459\",\"sourceIdentifier\":\"psirt@adobe.com\",\"published\":\"2009-10-13T10:30:00.577\",\"lastModified\":\"2025-04-09T00:30:58.490\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Heap-based buffer overflow in Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 allows remote attackers to execute arbitrary code via a crafted PDF file that triggers memory corruption, as exploited in the wild in October 2009. NOTE: some of these details are obtained from third party information.\"},{\"lang\":\"es\",\"value\":\"Un Desbordamiento de b\u00fafer en la regi\u00f3n heap de la memoria en Adobe Reader y Acrobat versi\u00f3n 7.x anterior a versi\u00f3n 7.1.4, versi\u00f3n 8.x anterior a 8.1.7, y versi\u00f3n 9.x anterior a 9.2, permite a los atacantes remotos ejecutar c\u00f3digo arbitrario por medio de un archivo PDF creado que desencadena la corrupci\u00f3n de memoria, tal y como fue explotado \\\"in the wild\\\" en octubre de 2009. NOTA: algunos de estos detalles se obtienen de informaci\u00f3n de terceros.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:C/I:C/A:C\",\"baseScore\":9.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.6,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"9.1.3\",\"matchCriteriaId\":\"84209F08-D75D-4C02-94E4-5942B244E632\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"465F9134-DD86-4F13-8C39-949BE6E7389A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB041EDF-EFF8-4AA6-8D59-411975547534\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C05F6A5-0FB3-489B-9B8B-64C569C03D7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:4.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AABA4FE3-662B-4956-904D-45086E000890\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:4.0.5a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"998CD79C-458E-46A8-8261-1C40C53D9FA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:4.0.5c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0155FB0B-7FAD-4388-96C8-A8543B4FDFD9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"201F059D-33D1-4D9F-9C6F-FC8EB49E4735\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:5.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B025E795-5713-485E-8A15-EBE4451A1A46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:5.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B453FA1D-0FE9-4324-9644-E167561926C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:5.0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDEA946E-B6D2-463B-89D0-F2F37278089E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"183B5940-2310-4D2E-99F0-9792A801A442\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:6.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F8BB13E-2732-4F9E-A588-EA1C00893C8B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:6.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5FCDCBF-597B-439C-8D8B-2819FC70C567\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:6.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"440B890A-90E9-4456-B92A-856CD17F0C78\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:6.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79BD9D8D-39DA-403E-915D-E1B6A46A6BAB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:6.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8976A7DC-1314-4C4A-A7C5-AA789D2DAB9C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FECFC942-4F04-420C-A9B4-AE0C0590317F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:7.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F81817F2-1E3A-4A52-88F1-6B614A2A1F0A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:7.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFFFFF0D-A80F-4B67-BEE2-86868EF7AA37\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:7.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DC97A87-2652-4AD6-8E10-419A9AC9C245\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:7.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E1F71AE-3591-499E-B09F-AAC4E38F1CF2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:7.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D75174C-EBF9-4117-9E66-80E847012853\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:7.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69B0305A-51D3-4E09-B96C-54B0ED921DA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:7.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9762FE57-837B-4FFA-9813-AC038450EB2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:7.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0055A38C-E421-40A1-8BC7-11856A20B8F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:7.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"758CC9EE-8929-405B-A845-83BAAECCB2AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:7.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21AC1961-12F7-456F-9CE4-9AAF116CF141\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26AE76F7-D7F6-4AF2-A5C6-708B5642C288\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"749FFB51-65D4-4A4B-95F3-742440276897\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:8.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8665E53-EC1E-4B95-9064-2565BC12113E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:8.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24218FDA-F9DA-465A-B5D5-76A55C7EE04E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:8.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2C5F1C5-85CD-47B9-897F-E51D6902AF72\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:8.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0E190FF-3EBC-44AB-8072-4D964E843E8A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:8.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B95C0A99-42E4-40A9-BF61-507E4E4DC052\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37AF9870-B9F0-42D2-B2D1-4A7E569A4C73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:9.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5FF485FB-3317-4C89-B636-F22FF19B00BE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7EC46E3-77B7-4455-B3E0-A45C6B69B3DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F475858-DCE2-4C93-A51A-04718DF17593\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88687272-4CD0-42A2-B727-C322ABDE3549\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"9.0\",\"matchCriteriaId\":\"840D37C8-F30C-4A91-9B34-39AF1E4E34C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA4A65AB-75F1-4F6B-83E4-354E7D1EAE3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AD49BF0-E8BC-4716-8B13-DF39267D9303\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:4.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71FC1CDB-DF7C-45FF-973D-8C9310121B0C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:4.0.5a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C8951B8-0DF2-48C9-9EAC-9EDCCD389958\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:4.0.5c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCCCF8E6-2117-4665-AC71-8F05771CDB15\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99E14042-AF3B-4609-8CFE-6E02B3DF5CF2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"822D6CAA-4CF7-41BE-B2AC-E7CBAB6229C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:5.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73579E5C-BDB2-4F9C-BB87-E3752B9030B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:5.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A57B3C8-B127-4A52-AB08-A1B6F7830914\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:5.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F131F390-EA28-41C2-A054-42E6B070FA8E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:5.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E26DE5FE-729C-4C3A-80FB-0FAFC90A8BEB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:5.0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C85609BE-4385-4728-AC7E-4231B45A3CE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:5.0.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29BDD58D-3200-48C1-AB30-07808E029061\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC93E153-9E21-4012-BFE0-0168488FFC17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30D445D4-2B00-451B-8744-CCA9F1E1ADA7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:6.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53D60FEC-557F-456B-8F35-170078EC5C6F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:6.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51A7B617-FDB3-4F46-AF1F-F9210FB2793B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:6.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B5D145B-FD5B-430E-8E90-929B00271C44\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:6.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40E8FD46-14E2-4D92-8A99-66EC41F38CF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:6.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78BA5B02-F565-4A7F-B9FD-DD08ABF258CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:7.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E3F0A07-7021-4D04-A8F2-1BCAB474CD2A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:7.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4C1C3A0-B0DF-42E4-A8AC-D93FCB6526D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:7.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3B5B11C-6E76-4A03-AC05-840EFE2F8504\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:7.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFF8D072-305A-40B9-9E89-D98BDD951346\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:7.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEF52FAE-B6EF-457D-A61A-95B5E31CEF7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:7.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A7236C5-85F8-47C5-8A24-D5282F94D77D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:7.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"718F2E95-E221-4928-B50F-AB840BBA0E9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:7.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"123D2B4E-0D05-453C-B598-E41D43FE0E96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:7.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0109ADA4-6BA0-4299-8043-7CD60DAD6DD7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:7.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F00A8EC-10FC-42B6-BB3E-985C903B91DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:8.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98BCBFB5-72DF-4B8A-8F4C-E958B4FAFB37\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:8.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71EB6E18-5764-4916-9ECA-F4E880672217\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:8.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61151189-E24C-4AB6-BC60-B9AF720E3D4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:8.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B65F7E5-05A4-45FC-BDC2-670166535721\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"026B1CF8-28A2-415D-A240-C9DF774BF9DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FBE16943-CCD8-4A39-832F-F6ED3CF2936B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:reader:9.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"42A1A800-D0CC-4593-A31A-EE308E63B454\"}]}]}],\"references\":[{\"url\":\"http://blogs.adobe.com/psirt/2009/10/adobe_reader_and_acrobat_issue_1.html\",\"source\":\"psirt@adobe.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://isc.sans.org/diary.html?storyid=7300\",\"source\":\"psirt@adobe.com\"},{\"url\":\"http://secunia.com/advisories/36983\",\"source\":\"psirt@adobe.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://securitytracker.com/id?1023007\",\"source\":\"psirt@adobe.com\"},{\"url\":\"http://www.adobe.com/support/security/bulletins/apsb09-15.html\",\"source\":\"psirt@adobe.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.iss.net/threats/348.html\",\"source\":\"psirt@adobe.com\"},{\"url\":\"http://www.securityfocus.com/bid/36600\",\"source\":\"psirt@adobe.com\"},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA09-286B.html\",\"source\":\"psirt@adobe.com\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/2851\",\"source\":\"psirt@adobe.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/2898\",\"source\":\"psirt@adobe.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/53691\",\"source\":\"psirt@adobe.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6534\",\"source\":\"psirt@adobe.com\"},{\"url\":\"http://blogs.adobe.com/psirt/2009/10/adobe_reader_and_acrobat_issue_1.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://isc.sans.org/diary.html?storyid=7300\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/36983\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://securitytracker.com/id?1023007\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.adobe.com/support/security/bulletins/apsb09-15.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.iss.net/threats/348.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/36600\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA09-286B.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/2851\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/2898\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/53691\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6534\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…