CVE-2009-0509

Heap-based buffer overflow in the JBIG2 filter in Adobe Reader 7 and Acrobat 7 before 7.1.3, Adobe Reader 8 and Acrobat 8 before 8.1.6, and Adobe Reader 9 and Acrobat 9 before 9.1.2 allows remote attackers to execute arbitrary code via a crafted file that triggers memory corruption.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html
http://secunia.com/advisories/34580 Vendor Advisory
http://secunia.com/advisories/35496
http://secunia.com/advisories/35655
http://secunia.com/advisories/35685
http://secunia.com/advisories/35734
http://security.gentoo.org/glsa/glsa-200907-06.xml
http://securitytracker.com/id?1022361
http://www.adobe.com/support/security/bulletins/apsb09-07.html Patch Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2009-1109.html
http://www.securityfocus.com/bid/35274
http://www.us-cert.gov/cas/techalerts/TA09-161A.html US Government Resource
http://www.vupen.com/english/advisories/2009/1547 Patch Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/49239
http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html
http://secunia.com/advisories/34580 Vendor Advisory
http://secunia.com/advisories/35496
http://secunia.com/advisories/35655
http://secunia.com/advisories/35685
http://secunia.com/advisories/35734
http://security.gentoo.org/glsa/glsa-200907-06.xml
http://securitytracker.com/id?1022361
http://www.adobe.com/support/security/bulletins/apsb09-07.html Patch Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2009-1109.html
http://www.securityfocus.com/bid/35274
http://www.us-cert.gov/cas/techalerts/TA09-161A.html US Government Resource
http://www.vupen.com/english/advisories/2009/1547 Patch Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/49239
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:adobe:acrobat:7.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0:*:professional:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0:*:standard:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.1:*:professional:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.1:*:standard:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.2:*:professional:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.2:*:standard:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.3:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.3:*:professional:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.3:*:standard:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.4:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.4:*:professional:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.4:*:standard:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.5:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.5:*:professional:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.5:*:standard:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.6:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.6:*:professional:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.6:*:standard:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.7:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.7:*:professional:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.7:*:standard:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.8:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.8:*:elements:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.8:*:professional:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.8:*:standard:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.9:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.9:*:professional:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.1:*:professional:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.1:*:standard:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.1.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.1.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.1.1:*:standard:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:8.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:8.0:*:professional:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:8.0:*:standard:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:8.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:8.1:*:standard:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:8.1.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:8.1.1:*:professional:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:8.1.1:*:standard:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:8.1.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:8.1.2:*:professional:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:8.1.2:*:standard:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:8.1.2:security_update:professional:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:8.1.3:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:8.1.3:*:professional:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:8.1.3:*:standard:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:8.1.4:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:8.1.4:*:professional:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:8.1.4:*:standard:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.0:*:standard:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.0.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.1:*:standard:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:7.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:7.0.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:7.0.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:7.0.3:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:7.0.4:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:7.0.5:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:7.0.6:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:7.0.7:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:7.0.8:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:7.0.9:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:7.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:7.1.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:8.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:8.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:8.1.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:8.1.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:8.1.2:security_update:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:8.1.3:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:8.1.4:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:8.1.5:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*

History

21 Nov 2024, 01:00

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00000.html - () http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00000.html -
References () http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html - () http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html -
References () http://secunia.com/advisories/34580 - Vendor Advisory () http://secunia.com/advisories/34580 - Vendor Advisory
References () http://secunia.com/advisories/35496 - () http://secunia.com/advisories/35496 -
References () http://secunia.com/advisories/35655 - () http://secunia.com/advisories/35655 -
References () http://secunia.com/advisories/35685 - () http://secunia.com/advisories/35685 -
References () http://secunia.com/advisories/35734 - () http://secunia.com/advisories/35734 -
References () http://security.gentoo.org/glsa/glsa-200907-06.xml - () http://security.gentoo.org/glsa/glsa-200907-06.xml -
References () http://securitytracker.com/id?1022361 - () http://securitytracker.com/id?1022361 -
References () http://www.adobe.com/support/security/bulletins/apsb09-07.html - Patch, Vendor Advisory () http://www.adobe.com/support/security/bulletins/apsb09-07.html - Patch, Vendor Advisory
References () http://www.redhat.com/support/errata/RHSA-2009-1109.html - () http://www.redhat.com/support/errata/RHSA-2009-1109.html -
References () http://www.securityfocus.com/bid/35274 - () http://www.securityfocus.com/bid/35274 -
References () http://www.us-cert.gov/cas/techalerts/TA09-161A.html - US Government Resource () http://www.us-cert.gov/cas/techalerts/TA09-161A.html - US Government Resource
References () http://www.vupen.com/english/advisories/2009/1547 - Patch, Vendor Advisory () http://www.vupen.com/english/advisories/2009/1547 - Patch, Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/49239 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/49239 -

Information

Published : 2009-06-11 15:30

Updated : 2024-11-21 01:00


NVD link : CVE-2009-0509

Mitre link : CVE-2009-0509

CVE.ORG link : CVE-2009-0509


JSON object : View

Products Affected

adobe

  • acrobat
  • acrobat_reader
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer