Use-after-free vulnerability in the Doc.media.newPlayer method in Multimedia.api in Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, allows remote attackers to execute arbitrary code via a crafted PDF file using ZLib compressed streams, as exploited in the wild in December 2009.
References
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
|
History
19 Dec 2024, 18:07
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/38138 - Broken Link, Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/54747 - Third Party Advisory, VDB Entry | |
References | () http://www.symantec.com/connect/blogs/zero-day-xmas-present - Broken Link | |
References | () http://contagiodump.blogspot.com/2009/12/virustotal-httpwww.html - Exploit, Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=547799 - Issue Tracking | |
References | () http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html - Mailing List, Third Party Advisory | |
References | () http://osvdb.org/60980 - Broken Link | |
References | () http://www.redhat.com/support/errata/RHSA-2010-0060.html - Broken Link | |
References | () http://www.us-cert.gov/cas/techalerts/TA10-013A.html - Third Party Advisory, US Government Resource | |
References | () http://www.vupen.com/english/advisories/2009/3518 - Broken Link, Vendor Advisory | |
References | () http://www.kb.cert.org/vuls/id/508357 - Third Party Advisory, US Government Resource | |
References | () http://www.shadowserver.org/wiki/pmwiki.php/Calendar/20091214 - Broken Link | |
References | () http://secunia.com/advisories/38215 - Broken Link, Vendor Advisory | |
References | () http://blogs.adobe.com/psirt/2009/12/new_adobe_reader_and_acrobat_v.html - Broken Link, Vendor Advisory | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6795 - Broken Link | |
References | () http://www.securityfocus.com/bid/37331 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.metasploit.com/redmine/projects/framework/repository/revisions/7881/entry/modules/exploits/windows/fileformat/adobe_media_newplayer.rb - Broken Link | |
References | () http://secunia.com/advisories/37690 - Broken Link, Vendor Advisory | |
References | () http://www.adobe.com/support/security/bulletins/apsb10-02.html - Not Applicable | |
References | () http://www.adobe.com/support/security/advisories/apsa09-07.html - Vendor Advisory | |
References | () http://www.vupen.com/english/advisories/2010/0103 - Broken Link |
28 Jun 2024, 14:20
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 9.3
v3 : 7.8 |
CWE | CWE-416 | |
First Time |
Apple
Opensuse opensuse Apple mac Os X Opensuse Microsoft Microsoft windows Suse linux Enterprise Suse Suse linux Enterprise Debuginfo |
|
CPE | cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:7.0.9:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:4.5:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:8.1.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:6.0.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:8.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:7.0.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:7.0.4:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:7.0.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:6.0.4:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:6.0.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:6.0.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:6.0.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:8.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:5.0.11:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:3.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:8.1.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:7.0.7:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:7.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:4.0.5:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:7.0.9:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:4.0.5a:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:7.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:5.0.6:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:6.0.4:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:7.0.6:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:6.0.5:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:7.0.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:6.0.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:4.0.5c:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:5.0.9:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:6.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:6.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:7.0.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:4.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:7.0.8:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:8.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:7.0.4:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:8.1.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:7.0.7:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:7.0.8:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:6.0.5:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:6.0.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:7.0.6:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:8.1.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:5.0.10:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:5.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:5.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:5.0.5:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:7.0.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:7.0.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:7.0.5:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:8.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:7.0.5:*:*:*:*:*:*:* |
cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise:10.0:sp3:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise:10.0:sp2:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* cpe:2.3:a:suse:linux_enterprise_debuginfo:11:-:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:* cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:* |
References | (CONFIRM) http://www.adobe.com/support/security/bulletins/apsb10-02.html - Not Applicable | |
References | (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6795 - Broken Link | |
References | (SECUNIA) http://secunia.com/advisories/37690 - Broken Link, Vendor Advisory | |
References | (SUSE) http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html - Mailing List, Third Party Advisory | |
References | (REDHAT) http://www.redhat.com/support/errata/RHSA-2010-0060.html - Broken Link | |
References | (MISC) http://contagiodump.blogspot.com/2009/12/virustotal-httpwww.html - Exploit, Third Party Advisory | |
References | (MISC) http://www.metasploit.com/redmine/projects/framework/repository/revisions/7881/entry/modules/exploits/windows/fileformat/adobe_media_newplayer.rb - Broken Link | |
References | (CONFIRM) https://bugzilla.redhat.com/show_bug.cgi?id=547799 - Issue Tracking | |
References | (CERT-VN) http://www.kb.cert.org/vuls/id/508357 - Third Party Advisory, US Government Resource | |
References | (BID) http://www.securityfocus.com/bid/37331 - Broken Link, Third Party Advisory, VDB Entry | |
References | (MISC) http://www.symantec.com/connect/blogs/zero-day-xmas-present - Broken Link | |
References | (MISC) http://blogs.adobe.com/psirt/2009/12/new_adobe_reader_and_acrobat_v.html - Broken Link, Vendor Advisory | |
References | (CERT) http://www.us-cert.gov/cas/techalerts/TA10-013A.html - Third Party Advisory, US Government Resource | |
References | (VUPEN) http://www.vupen.com/english/advisories/2010/0103 - Broken Link | |
References | (OSVDB) http://osvdb.org/60980 - Broken Link | |
References | (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/54747 - Third Party Advisory, VDB Entry | |
References | (SECUNIA) http://secunia.com/advisories/38138 - Broken Link, Vendor Advisory | |
References | (MISC) http://www.shadowserver.org/wiki/pmwiki.php/Calendar/20091214 - Broken Link | |
References | (SECUNIA) http://secunia.com/advisories/38215 - Broken Link, Vendor Advisory | |
References | (VUPEN) http://www.vupen.com/english/advisories/2009/3518 - Broken Link, Vendor Advisory |
Information
Published : 2009-12-15 02:30
Updated : 2025-02-13 17:42
NVD link : CVE-2009-4324
Mitre link : CVE-2009-4324
JSON object : View
Products Affected
adobe
- acrobat
- acrobat_reader
apple
- mac_os_x
suse
- linux_enterprise_debuginfo
- linux_enterprise
opensuse
- opensuse
microsoft
- windows
CWE
CWE-416
Use After Free