Use-after-free vulnerability in the Doc.media.newPlayer method in Multimedia.api in Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, allows remote attackers to execute arbitrary code via a crafted PDF file using ZLib compressed streams, as exploited in the wild in December 2009.
References
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
|
History
21 Nov 2024, 01:09
Type | Values Removed | Values Added |
---|---|---|
References | () http://blogs.adobe.com/psirt/2009/12/new_adobe_reader_and_acrobat_v.html - Broken Link, Vendor Advisory | |
References | () http://contagiodump.blogspot.com/2009/12/virustotal-httpwww.html - Exploit, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html - Mailing List, Third Party Advisory | |
References | () http://osvdb.org/60980 - Broken Link | |
References | () http://secunia.com/advisories/37690 - Broken Link, Vendor Advisory | |
References | () http://secunia.com/advisories/38138 - Broken Link, Vendor Advisory | |
References | () http://secunia.com/advisories/38215 - Broken Link, Vendor Advisory | |
References | () http://www.adobe.com/support/security/advisories/apsa09-07.html - Vendor Advisory | |
References | () http://www.adobe.com/support/security/bulletins/apsb10-02.html - Not Applicable | |
References | () http://www.kb.cert.org/vuls/id/508357 - Third Party Advisory, US Government Resource | |
References | () http://www.metasploit.com/redmine/projects/framework/repository/revisions/7881/entry/modules/exploits/windows/fileformat/adobe_media_newplayer.rb - Broken Link | |
References | () http://www.redhat.com/support/errata/RHSA-2010-0060.html - Broken Link | |
References | () http://www.securityfocus.com/bid/37331 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.shadowserver.org/wiki/pmwiki.php/Calendar/20091214 - Broken Link | |
References | () http://www.symantec.com/connect/blogs/zero-day-xmas-present - Broken Link | |
References | () http://www.us-cert.gov/cas/techalerts/TA10-013A.html - Third Party Advisory, US Government Resource | |
References | () http://www.vupen.com/english/advisories/2009/3518 - Broken Link, Vendor Advisory | |
References | () http://www.vupen.com/english/advisories/2010/0103 - Broken Link | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=547799 - Issue Tracking | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/54747 - Third Party Advisory, VDB Entry | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6795 - Broken Link |
28 Jun 2024, 14:20
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-416 | |
CVSS |
v2 : v3 : |
v2 : 9.3
v3 : 7.8 |
CPE | cpe:2.3:a:adobe:acrobat_reader:7.0.4:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:6.0.5:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:8.1.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:7.0.9:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:7.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:3.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:5.0.9:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:6.0.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:7.0.6:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:7.0.5:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:5.0.6:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:7.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:5.0.7:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:7.0.5:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:7.0.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:5.0.10:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:7.0.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:7.0.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:7.0.9:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:6.0.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:7.0.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:7.0.8:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:7.0.7:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:4.0.5a:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:5.0.5:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:5.0.11:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:6.0.5:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:7.0.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:6.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:4.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:4.0.5c:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:7.0.8:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:8.1.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:7.0.7:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:6.0.4:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:4.5:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:6.0.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:7.0.6:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:6.0.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:6.0.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:6.0.4:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:8.1.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:4.0.5:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:6.0.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:8.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:7.0.4:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:5.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:8.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:7.0.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:6.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:8.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:8.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:8.1.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:* |
cpe:2.3:o:suse:linux_enterprise:10.0:sp3:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise:10.0:sp2:*:*:*:*:*:* cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* cpe:2.3:a:suse:linux_enterprise_debuginfo:11:-:*:*:*:*:*:* cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:* |
First Time |
Opensuse opensuse
Apple mac Os X Apple Opensuse Suse Suse linux Enterprise Microsoft windows Microsoft Suse linux Enterprise Debuginfo |
|
References | () http://blogs.adobe.com/psirt/2009/12/new_adobe_reader_and_acrobat_v.html - Broken Link, Vendor Advisory | |
References | () http://contagiodump.blogspot.com/2009/12/virustotal-httpwww.html - Exploit, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html - Mailing List, Third Party Advisory | |
References | () http://osvdb.org/60980 - Broken Link | |
References | () http://secunia.com/advisories/37690 - Broken Link, Vendor Advisory | |
References | () http://secunia.com/advisories/38138 - Broken Link, Vendor Advisory | |
References | () http://secunia.com/advisories/38215 - Broken Link, Vendor Advisory | |
References | () http://www.adobe.com/support/security/bulletins/apsb10-02.html - Not Applicable | |
References | () http://www.kb.cert.org/vuls/id/508357 - Third Party Advisory, US Government Resource | |
References | () http://www.metasploit.com/redmine/projects/framework/repository/revisions/7881/entry/modules/exploits/windows/fileformat/adobe_media_newplayer.rb - Broken Link | |
References | () http://www.redhat.com/support/errata/RHSA-2010-0060.html - Broken Link | |
References | () http://www.securityfocus.com/bid/37331 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.shadowserver.org/wiki/pmwiki.php/Calendar/20091214 - Broken Link | |
References | () http://www.symantec.com/connect/blogs/zero-day-xmas-present - Broken Link | |
References | () http://www.us-cert.gov/cas/techalerts/TA10-013A.html - Third Party Advisory, US Government Resource | |
References | () http://www.vupen.com/english/advisories/2009/3518 - Broken Link, Vendor Advisory | |
References | () http://www.vupen.com/english/advisories/2010/0103 - Broken Link | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=547799 - Issue Tracking | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/54747 - Third Party Advisory, VDB Entry | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6795 - Broken Link |
Information
Published : 2009-12-15 02:30
Updated : 2025-04-09 00:30
NVD link : CVE-2009-4324
Mitre link : CVE-2009-4324
CVE.ORG link : CVE-2009-4324
JSON object : View
Products Affected
adobe
- acrobat
- acrobat_reader
opensuse
- opensuse
microsoft
- windows
apple
- mac_os_x
suse
- linux_enterprise_debuginfo
- linux_enterprise
CWE
CWE-416
Use After Free