The JavaScript for Acrobat API in Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 does not properly implement the (1) Privileged Context and (2) Safe Path restrictions for unspecified JavaScript methods, which allows remote attackers to create arbitrary files, and possibly execute arbitrary code, via the cPath parameter in a crafted PDF file. NOTE: some of these details are obtained from third party information.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 01:06
Type | Values Removed | Values Added |
---|---|---|
References | () http://securitytracker.com/id?1023007 - | |
References | () http://www.adobe.com/support/security/bulletins/apsb09-15.html - Patch, Vendor Advisory | |
References | () http://www.kb.cert.org/vuls/id/257117 - Patch, US Government Resource | |
References | () http://www.securityfocus.com/bid/36638 - | |
References | () http://www.securityfocus.com/bid/36664 - | |
References | () http://www.us-cert.gov/cas/techalerts/TA09-286B.html - Patch, US Government Resource | |
References | () http://www.vupen.com/english/advisories/2009/2898 - Patch, Vendor Advisory | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5822 - |
Information
Published : 2009-10-19 22:30
Updated : 2024-11-21 01:06
NVD link : CVE-2009-2993
Mitre link : CVE-2009-2993
CVE.ORG link : CVE-2009-2993
JSON object : View
Products Affected
adobe
- acrobat
- acrobat_reader
CWE
CWE-20
Improper Input Validation