CVE-2009-0927

Stack-based buffer overflow in Adobe Reader and Adobe Acrobat 9 before 9.1, 8 before 8.1.3 , and 7 before 7.1.1 allows remote attackers to execute arbitrary code via a crafted argument to the getIcon method of a Collab object, a different vulnerability than CVE-2009-0658.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00005.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html Mailing List Third Party Advisory
http://secunia.com/advisories/34490 Third Party Advisory
http://secunia.com/advisories/34706 Third Party Advisory
http://secunia.com/advisories/34790 Third Party Advisory
http://security.gentoo.org/glsa/glsa-200904-17.xml Third Party Advisory
http://sunsolve.sun.com/search/document.do?assetkey=1-66-256788-1 Broken Link
http://www.adobe.com/support/security/bulletins/apsb09-04.html Patch Vendor Advisory
http://www.exploit-db.com/exploits/9579 Third Party Advisory VDB Entry
http://www.securityfocus.com/archive/1/502116/100/0/threaded Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/34169 Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1021861 Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2009/0770 Third Party Advisory
http://www.vupen.com/english/advisories/2009/1019 Third Party Advisory
http://www.zerodayinitiative.com/advisories/ZDI-09-014 Third Party Advisory VDB Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/49312 Third Party Advisory VDB Entry
http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00005.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html Mailing List Third Party Advisory
http://secunia.com/advisories/34490 Third Party Advisory
http://secunia.com/advisories/34706 Third Party Advisory
http://secunia.com/advisories/34790 Third Party Advisory
http://security.gentoo.org/glsa/glsa-200904-17.xml Third Party Advisory
http://sunsolve.sun.com/search/document.do?assetkey=1-66-256788-1 Broken Link
http://www.adobe.com/support/security/bulletins/apsb09-04.html Patch Vendor Advisory
http://www.exploit-db.com/exploits/9579 Third Party Advisory VDB Entry
http://www.securityfocus.com/archive/1/502116/100/0/threaded Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/34169 Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1021861 Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2009/0770 Third Party Advisory
http://www.vupen.com/english/advisories/2009/1019 Third Party Advisory
http://www.zerodayinitiative.com/advisories/ZDI-09-014 Third Party Advisory VDB Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/49312 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*

History

21 Nov 2024, 01:01

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00005.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00005.html - Mailing List, Third Party Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html - Mailing List, Third Party Advisory
References () http://secunia.com/advisories/34490 - Third Party Advisory () http://secunia.com/advisories/34490 - Third Party Advisory
References () http://secunia.com/advisories/34706 - Third Party Advisory () http://secunia.com/advisories/34706 - Third Party Advisory
References () http://secunia.com/advisories/34790 - Third Party Advisory () http://secunia.com/advisories/34790 - Third Party Advisory
References () http://security.gentoo.org/glsa/glsa-200904-17.xml - Third Party Advisory () http://security.gentoo.org/glsa/glsa-200904-17.xml - Third Party Advisory
References () http://sunsolve.sun.com/search/document.do?assetkey=1-66-256788-1 - Broken Link () http://sunsolve.sun.com/search/document.do?assetkey=1-66-256788-1 - Broken Link
References () http://www.adobe.com/support/security/bulletins/apsb09-04.html - Patch, Vendor Advisory () http://www.adobe.com/support/security/bulletins/apsb09-04.html - Patch, Vendor Advisory
References () http://www.exploit-db.com/exploits/9579 - Third Party Advisory, VDB Entry () http://www.exploit-db.com/exploits/9579 - Third Party Advisory, VDB Entry
References () http://www.securityfocus.com/archive/1/502116/100/0/threaded - Third Party Advisory, VDB Entry () http://www.securityfocus.com/archive/1/502116/100/0/threaded - Third Party Advisory, VDB Entry
References () http://www.securityfocus.com/bid/34169 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/34169 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id?1021861 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id?1021861 - Third Party Advisory, VDB Entry
References () http://www.vupen.com/english/advisories/2009/0770 - Third Party Advisory () http://www.vupen.com/english/advisories/2009/0770 - Third Party Advisory
References () http://www.vupen.com/english/advisories/2009/1019 - Third Party Advisory () http://www.vupen.com/english/advisories/2009/1019 - Third Party Advisory
References () http://www.zerodayinitiative.com/advisories/ZDI-09-014 - Third Party Advisory, VDB Entry () http://www.zerodayinitiative.com/advisories/ZDI-09-014 - Third Party Advisory, VDB Entry
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/49312 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/49312 - Third Party Advisory, VDB Entry

Information

Published : 2009-03-19 10:30

Updated : 2024-11-21 01:01


NVD link : CVE-2009-0927

Mitre link : CVE-2009-0927

CVE.ORG link : CVE-2009-0927


JSON object : View

Products Affected

adobe

  • acrobat_reader
CWE
CWE-20

Improper Input Validation