CVE-2009-1062

Adobe Acrobat Reader 9 before 9.1, 8 before 8.1.4, and 7 before 7.1.1 might allow remote attackers to trigger memory corruption and possibly execute arbitrary code via unknown attack vectors related to JBIG2, a different vulnerability than CVE-2009-0193 and CVE-2009-1061.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html
http://secunia.com/advisories/34392 Vendor Advisory
http://secunia.com/advisories/34490 Vendor Advisory
http://secunia.com/advisories/34706 Vendor Advisory
http://secunia.com/advisories/34790 Vendor Advisory
http://security.gentoo.org/glsa/glsa-200904-17.xml
http://sunsolve.sun.com/search/document.do?assetkey=1-66-256788-1
http://www.adobe.com/support/security/bulletins/apsb09-04.html Patch Vendor Advisory
http://www.ivizsecurity.com/security-advisory-iviz-sr-09001.html Patch
http://www.redhat.com/support/errata/RHSA-2009-0376.html
http://www.securityfocus.com/bid/34229 Patch
http://www.securitytracker.com/id?1021892
http://www.vupen.com/english/advisories/2009/1019 Vendor Advisory
http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html
http://secunia.com/advisories/34392 Vendor Advisory
http://secunia.com/advisories/34490 Vendor Advisory
http://secunia.com/advisories/34706 Vendor Advisory
http://secunia.com/advisories/34790 Vendor Advisory
http://security.gentoo.org/glsa/glsa-200904-17.xml
http://sunsolve.sun.com/search/document.do?assetkey=1-66-256788-1
http://www.adobe.com/support/security/bulletins/apsb09-04.html Patch Vendor Advisory
http://www.ivizsecurity.com/security-advisory-iviz-sr-09001.html Patch
http://www.redhat.com/support/errata/RHSA-2009-0376.html
http://www.securityfocus.com/bid/34229 Patch
http://www.securitytracker.com/id?1021892
http://www.vupen.com/english/advisories/2009/1019 Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:adobe:acrobat:*:*:professional:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:*:*:standard:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0:*:professional:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0:*:standard:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.1:*:professional:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.1:*:standard:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.2:*:professional:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.2:*:standard:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.3:*:professional:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.3:*:standard:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.4:*:professional:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.4:*:standard:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.5:*:professional:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.5:*:standard:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.6:*:professional:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.6:*:standard:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.7:*:professional:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.7:*:standard:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.8:*:professional:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.8:*:standard:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.9:*:professional:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.1:*:professional:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.1:*:standard:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.1.1:*:standard:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:8.0:*:professional:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:8.0:*:standard:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:8.1:*:standard:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:8.1.1:*:professional:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:8.1.1:*:standard:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:8.1.2:*:professional:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:8.1.2:*:standard:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:8.1.2:security_update:professional:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:8.1.3:*:professional:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:8.1.3:*:standard:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:8.1.4:*:professional:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:8.1.4:*:standard:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:7.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:reader:3.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:reader:4.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:reader:4.0.5:*:*:*:*:*:*:*
cpe:2.3:a:adobe:reader:4.0.5a:*:*:*:*:*:*:*
cpe:2.3:a:adobe:reader:4.0.5c:*:*:*:*:*:*:*
cpe:2.3:a:adobe:reader:4.5:*:*:*:*:*:*:*
cpe:2.3:a:adobe:reader:5.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:reader:5.0.5:*:*:*:*:*:*:*
cpe:2.3:a:adobe:reader:5.0.6:*:*:*:*:*:*:*
cpe:2.3:a:adobe:reader:5.0.7:*:*:*:*:*:*:*
cpe:2.3:a:adobe:reader:5.0.9:*:*:*:*:*:*:*
cpe:2.3:a:adobe:reader:5.0.10:*:*:*:*:*:*:*
cpe:2.3:a:adobe:reader:5.0.11:*:*:*:*:*:*:*
cpe:2.3:a:adobe:reader:5.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:reader:6.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:reader:6.0.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:reader:6.0.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:reader:6.0.3:*:*:*:*:*:*:*
cpe:2.3:a:adobe:reader:6.0.4:*:*:*:*:*:*:*
cpe:2.3:a:adobe:reader:6.0.5:*:*:*:*:*:*:*
cpe:2.3:a:adobe:reader:7.0.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:reader:7.0.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:reader:7.0.3:*:*:*:*:*:*:*
cpe:2.3:a:adobe:reader:7.0.5:*:*:*:*:*:*:*
cpe:2.3:a:adobe:reader:7.0.7:*:*:*:*:*:*:*
cpe:2.3:a:adobe:reader:7.0.8:*:*:*:*:*:*:*
cpe:2.3:a:adobe:reader:7.0.9:*:*:*:*:*:*:*
cpe:2.3:a:adobe:reader:7.1.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:reader:7.1.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:reader:8.1.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:reader:8.1.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:reader:8.1.4:*:*:*:*:*:*:*

History

21 Nov 2024, 01:01

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00005.html - () http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00005.html -
References () http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html - () http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html -
References () http://secunia.com/advisories/34392 - Vendor Advisory () http://secunia.com/advisories/34392 - Vendor Advisory
References () http://secunia.com/advisories/34490 - Vendor Advisory () http://secunia.com/advisories/34490 - Vendor Advisory
References () http://secunia.com/advisories/34706 - Vendor Advisory () http://secunia.com/advisories/34706 - Vendor Advisory
References () http://secunia.com/advisories/34790 - Vendor Advisory () http://secunia.com/advisories/34790 - Vendor Advisory
References () http://security.gentoo.org/glsa/glsa-200904-17.xml - () http://security.gentoo.org/glsa/glsa-200904-17.xml -
References () http://sunsolve.sun.com/search/document.do?assetkey=1-66-256788-1 - () http://sunsolve.sun.com/search/document.do?assetkey=1-66-256788-1 -
References () http://www.adobe.com/support/security/bulletins/apsb09-04.html - Patch, Vendor Advisory () http://www.adobe.com/support/security/bulletins/apsb09-04.html - Patch, Vendor Advisory
References () http://www.ivizsecurity.com/security-advisory-iviz-sr-09001.html - Patch () http://www.ivizsecurity.com/security-advisory-iviz-sr-09001.html - Patch
References () http://www.redhat.com/support/errata/RHSA-2009-0376.html - () http://www.redhat.com/support/errata/RHSA-2009-0376.html -
References () http://www.securityfocus.com/bid/34229 - Patch () http://www.securityfocus.com/bid/34229 - Patch
References () http://www.securitytracker.com/id?1021892 - () http://www.securitytracker.com/id?1021892 -
References () http://www.vupen.com/english/advisories/2009/1019 - Vendor Advisory () http://www.vupen.com/english/advisories/2009/1019 - Vendor Advisory

Information

Published : 2009-03-25 01:30

Updated : 2024-11-21 01:01


NVD link : CVE-2009-1062

Mitre link : CVE-2009-1062

CVE.ORG link : CVE-2009-1062


JSON object : View

Products Affected

adobe

  • acrobat_reader
  • acrobat
  • reader
CWE
CWE-20

Improper Input Validation