9.3

CVE-2009-0927

Warnung
Stack-based buffer overflow in Adobe Reader and Adobe Acrobat 9 before 9.1, 8 before 8.1.3 , and 7 before 7.1.1 allows remote attackers to execute arbitrary code via a crafted argument to the getIcon method of a Collab object, a different vulnerability than CVE-2009-0658.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
AdobeAcrobat Reader Version >= 7.0 < 7.1.1
AdobeAcrobat Reader Version >= 8.0 < 8.1.3
AdobeAcrobat Reader Version >= 9.0 < 9.1

25.03.2022: CISA Known Exploited Vulnerabilities (KEV) Catalog

Adobe Reader and Adobe Acrobat Stack-Based Buffer Overflow Vulnerability

Schwachstelle

Stack-based buffer overflow in Adobe Reader and Adobe Acrobat allows remote attackers to execute arbitrary code.

Beschreibung

Apply updates per vendor instructions.

Erforderliche Maßnahmen
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 93.67% 0.998
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 8.8 2.8 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
nvd@nist.gov 9.3 8.6 10
AV:N/AC:M/Au:N/C:C/I:C/A:C
134c704f-9b21-4f2e-91b3-4a467353bcc0 8.8 2.8 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CWE-121 Stack-based Buffer Overflow

A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).

CWE-20 Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.

http://www.exploit-db.com/exploits/9579
Third Party Advisory
VDB Entry
http://www.securityfocus.com/bid/34169
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1021861
Third Party Advisory
VDB Entry