9.3

CVE-2009-4324

Warning
Exploit

Use-after-free vulnerability in the Doc.media.newPlayer method in Multimedia.api in Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, allows remote attackers to execute arbitrary code via a crafted PDF file using ZLib compressed streams, as exploited in the wild in December 2009.

Data is provided by the National Vulnerability Database (NVD)
AdobeAcrobat Version >= 8.0 < 8.2
   ApplemacOS X Version-
   MicrosoftWindows Version-
AdobeAcrobat Version >= 9.0 < 9.3
   ApplemacOS X Version-
   MicrosoftWindows Version-
AdobeAcrobat Reader Version >= 8.0 < 8.2
   ApplemacOS X Version-
   MicrosoftWindows Version-
AdobeAcrobat Reader Version >= 9.0 < 9.3
   ApplemacOS X Version-
   MicrosoftWindows Version-
SuseLinux Enterprise Debuginfo Version11 Update-
OpensuseOpensuse Version11.1
OpensuseOpensuse Version11.2
SuseLinux Enterprise Version10.0 Updatesp2
SuseLinux Enterprise Version10.0 Updatesp3

08.06.2022: CISA Known Exploited Vulnerabilities (KEV) Catalog

Adobe Acrobat and Reader Use-After-Free Vulnerability

Vulnerability

Use-after-free vulnerability in Adobe Acrobat and Reader allows remote attackers to execute code via a crafted PDF file.

Description

Apply updates per vendor instructions.

Required actions
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 92.89% 0.998
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 7.8 1.8 5.9
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
nvd@nist.gov 9.3 8.6 10
AV:N/AC:M/Au:N/C:C/I:C/A:C
134c704f-9b21-4f2e-91b3-4a467353bcc0 7.8 1.8 5.9
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CWE-416 Use After Free

The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory "belongs" to the code that operates on the new pointer.

http://secunia.com/advisories/37690
Vendor Advisory
Broken Link
http://secunia.com/advisories/38138
Vendor Advisory
Broken Link
http://secunia.com/advisories/38215
Vendor Advisory
Broken Link
http://www.kb.cert.org/vuls/id/508357
Third Party Advisory
US Government Resource
http://www.securityfocus.com/bid/37331
Third Party Advisory
Broken Link
VDB Entry
http://www.us-cert.gov/cas/techalerts/TA10-013A.html
Third Party Advisory
US Government Resource