The U3D implementation in Adobe Reader and Acrobat 9.x before 9.3, 8.x before 8.2 on Windows and Mac OS X, and 7.x before 7.1.4 allows remote attackers to execute arbitrary code via malformed U3D data in a PDF document, related to a CLODProgressiveMeshDeclaration "array boundary issue," a different vulnerability than CVE-2009-2994.
References
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
|
History
19 Dec 2024, 18:08
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securitytracker.com/id?1023446 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://secunia.com/advisories/38138 - Broken Link | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8242 - Broken Link | |
References | () http://www.metasploit.com/modules/exploit/windows/fileformat/adobe_u3d_meshdecl - Third Party Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/55551 - Third Party Advisory, VDB Entry | |
References | () http://osvdb.org/61690 - Broken Link | |
References | () http://www.redhat.com/support/errata/RHSA-2010-0060.html - Broken Link | |
References | () http://www.adobe.com/support/security/bulletins/apsb10-02.html - Not Applicable, Patch, Vendor Advisory | |
References | () http://www.us-cert.gov/cas/techalerts/TA10-013A.html - Third Party Advisory, US Government Resource | |
References | () http://secunia.com/advisories/38215 - Broken Link | |
References | () http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html - Mailing List, Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=554293 - Issue Tracking | |
References | () http://www.securityfocus.com/bid/37758 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.vupen.com/english/advisories/2010/0103 - Broken Link, Vendor Advisory |
28 Jun 2024, 14:20
Type | Values Removed | Values Added |
---|---|---|
References | (REDHAT) http://www.redhat.com/support/errata/RHSA-2010-0060.html - Broken Link | |
References | (CERT) http://www.us-cert.gov/cas/techalerts/TA10-013A.html - Third Party Advisory, US Government Resource | |
References | (VUPEN) http://www.vupen.com/english/advisories/2010/0103 - Broken Link, Vendor Advisory | |
References | (CONFIRM) https://bugzilla.redhat.com/show_bug.cgi?id=554293 - Issue Tracking | |
References | (SECTRACK) http://www.securitytracker.com/id?1023446 - Broken Link, Third Party Advisory, VDB Entry | |
References | (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8242 - Broken Link | |
References | (CONFIRM) http://www.adobe.com/support/security/bulletins/apsb10-02.html - Not Applicable, Patch, Vendor Advisory | |
References | (SECUNIA) http://secunia.com/advisories/38138 - Broken Link | |
References | (BID) http://www.securityfocus.com/bid/37758 - Broken Link, Third Party Advisory, VDB Entry | |
References | (SUSE) http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html - Mailing List, Third Party Advisory | |
References | (OSVDB) http://osvdb.org/61690 - Broken Link | |
References | (SECUNIA) http://secunia.com/advisories/38215 - Broken Link | |
References | (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/55551 - Third Party Advisory, VDB Entry | |
References | (MISC) http://www.metasploit.com/modules/exploit/windows/fileformat/adobe_u3d_meshdecl - Third Party Advisory | |
CPE | cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:7.0.9:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:4.5:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:4.0.5c:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:6.0.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:7.0.4:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.1.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:6.0.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:8.1.7:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:6.0.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:6.0.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:8.1.5:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:5.0.11:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:7.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:7.0.7:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:4.0.5:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:7.1.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:7.0.9:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:5.0.6:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:4.0.5a:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:7.0.6:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:4.0.5c:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:7.1.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:7.0.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:7.0.4:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:4.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:7.0.8:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:8.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:5.0.6:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:6.0.6:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:8.1.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:5.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:6.0.5:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:6.0.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:5.0.5:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:5.0.10:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:7.1.4:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:7.1.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:4.0.5a:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:7.0.5:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:5.0.7:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:8.1.1:*:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:8.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:7.0.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:7.0.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:6.0.4:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:8.1.6:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:8.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:8.1.7:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:3.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:8.1.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:8.1.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:4.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:3.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:4.0.5:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:8.1.4:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:7.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:8.1.4:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:6.0.4:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:8.1.5:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:6.0.5:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:6.0.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:7.0.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:3.02:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:8.1.6:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:5.0.9:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:6.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:6.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:7.1.0:*:*:*:*:*:*:* cpe:2.3:o:unix:unix:*:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:7.0.7:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:7.0.8:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:7.0.6:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:8.1.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:5.0.5:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:3.01:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:5.0.10:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:5.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:7.0.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:3.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:7.0.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:7.0.5:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:7.1.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:5.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:7.1.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:8.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:7.1.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:7.1.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.1.3:*:*:*:*:*:*:* |
cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise:10.0:sp3:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise:10.0:sp2:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* cpe:2.3:a:suse:linux_enterprise_debuginfo:11:-:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:* cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:* |
First Time |
Opensuse opensuse
Opensuse Suse linux Enterprise Suse Suse linux Enterprise Debuginfo |
|
CWE | CWE-787 | |
CVSS |
v2 : v3 : |
v2 : 10.0
v3 : 8.8 |
Information
Published : 2010-01-13 19:30
Updated : 2025-02-13 17:42
NVD link : CVE-2009-3953
Mitre link : CVE-2009-3953
JSON object : View
Products Affected
adobe
- acrobat
apple
- mac_os_x
suse
- linux_enterprise_debuginfo
- linux_enterprise
opensuse
- opensuse
microsoft
- windows
CWE
CWE-787
Out-of-bounds Write