The U3D implementation in Adobe Reader and Acrobat 9.x before 9.3, 8.x before 8.2 on Windows and Mac OS X, and 7.x before 7.1.4 allows remote attackers to execute arbitrary code via malformed U3D data in a PDF document, related to a CLODProgressiveMeshDeclaration "array boundary issue," a different vulnerability than CVE-2009-2994.
References
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
|
History
21 Nov 2024, 01:08
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html - Mailing List, Third Party Advisory | |
References | () http://osvdb.org/61690 - Broken Link | |
References | () http://secunia.com/advisories/38138 - Broken Link | |
References | () http://secunia.com/advisories/38215 - Broken Link | |
References | () http://www.adobe.com/support/security/bulletins/apsb10-02.html - Not Applicable, Patch, Vendor Advisory | |
References | () http://www.metasploit.com/modules/exploit/windows/fileformat/adobe_u3d_meshdecl - Third Party Advisory | |
References | () http://www.redhat.com/support/errata/RHSA-2010-0060.html - Broken Link | |
References | () http://www.securityfocus.com/bid/37758 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id?1023446 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.us-cert.gov/cas/techalerts/TA10-013A.html - Third Party Advisory, US Government Resource | |
References | () http://www.vupen.com/english/advisories/2010/0103 - Broken Link, Vendor Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=554293 - Issue Tracking | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/55551 - Third Party Advisory, VDB Entry | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8242 - Broken Link |
28 Jun 2024, 14:20
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html - Mailing List, Third Party Advisory | |
References | () http://osvdb.org/61690 - Broken Link | |
References | () http://secunia.com/advisories/38138 - Broken Link | |
References | () http://secunia.com/advisories/38215 - Broken Link | |
References | () http://www.adobe.com/support/security/bulletins/apsb10-02.html - Not Applicable, Patch, Vendor Advisory | |
References | () http://www.metasploit.com/modules/exploit/windows/fileformat/adobe_u3d_meshdecl - Third Party Advisory | |
References | () http://www.redhat.com/support/errata/RHSA-2010-0060.html - Broken Link | |
References | () http://www.securityfocus.com/bid/37758 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id?1023446 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.us-cert.gov/cas/techalerts/TA10-013A.html - Third Party Advisory, US Government Resource | |
References | () http://www.vupen.com/english/advisories/2010/0103 - Broken Link, Vendor Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=554293 - Issue Tracking | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/55551 - Third Party Advisory, VDB Entry | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8242 - Broken Link | |
CVSS |
v2 : v3 : |
v2 : 10.0
v3 : 8.8 |
CPE | cpe:2.3:a:adobe:acrobat_reader:3.02:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:6.0.2:*:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:7.0.4:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:7.0.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:7.0.9:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:5.0.6:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:8.1.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:5.0.5:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:7.0.6:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:7.0.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:7.1.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:5.0.11:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:3.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:4.0.5:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:4.5:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:6.0.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:6.0.4:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:4.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:4.0.5a:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:7.1.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:8.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:8.1.6:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:7.1.4:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:7.0.8:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:7.0.6:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:6.0:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:7.0.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:6.0.6:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:7.0.5:*:*:*:*:*:*:* cpe:2.3:o:unix:unix:*:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:8.1.4:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:7.0.7:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:8.1.4:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:8.1.6:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:8.1.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:7.0.4:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:8.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:8.1.5:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:7.0.8:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:6.0.5:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:7.1.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:7.1.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:5.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:8.1.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:4.0.5c:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:4.0.5a:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:3.01:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:8.1.7:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:5.0.10:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:8.1.5:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:4.0.5c:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:6.0.4:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:8.1.7:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:7.1.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:7.0.5:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:4.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:7.1.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:5.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:7.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:6.0.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:5.0.6:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:5.0.9:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.1.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:4.0.5:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:8.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:5.0.7:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:7.0.7:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:5.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:8.1.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:7.0.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:6.0.5:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.1.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:7.1.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:7.0.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:5.0.10:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:6.0.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:7.1.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:6.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:8.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:7.0.9:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:8.1.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:3.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:7.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:6.0.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:7.0.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:6.0.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:3.0:*:*:*:*:*:*:* |
cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise:10.0:sp2:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise:10.0:sp3:*:*:*:*:*:* cpe:2.3:a:suse:linux_enterprise_debuginfo:11:-:*:*:*:*:*:* |
First Time |
Suse linux Enterprise
Suse linux Enterprise Debuginfo Suse Opensuse opensuse Opensuse |
|
CWE | CWE-787 |
Information
Published : 2010-01-13 19:30
Updated : 2024-11-21 01:08
NVD link : CVE-2009-3953
Mitre link : CVE-2009-3953
CVE.ORG link : CVE-2009-3953
JSON object : View
Products Affected
apple
- mac_os_x
opensuse
- opensuse
adobe
- acrobat
microsoft
- windows
suse
- linux_enterprise
- linux_enterprise_debuginfo
CWE
CWE-787
Out-of-bounds Write