CVE-2009-3959

Integer overflow in the U3D implementation in Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, allows remote attackers to execute arbitrary code via a malformed PDF document.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html
http://secunia.com/advisories/38138
http://secunia.com/advisories/38215
http://www.adobe.com/support/security/bulletins/apsb10-02.html Patch Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2010-0060.html
http://www.securityfocus.com/archive/1/508949
http://www.securityfocus.com/bid/37756
http://www.securitytracker.com/id?1023446
http://www.us-cert.gov/cas/techalerts/TA10-013A.html US Government Resource
http://www.vupen.com/english/advisories/2010/0103 Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=554293
https://exchange.xforce.ibmcloud.com/vulnerabilities/55557
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8539
http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html
http://secunia.com/advisories/38138
http://secunia.com/advisories/38215
http://www.adobe.com/support/security/bulletins/apsb10-02.html Patch Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2010-0060.html
http://www.securityfocus.com/archive/1/508949
http://www.securityfocus.com/bid/37756
http://www.securitytracker.com/id?1023446
http://www.us-cert.gov/cas/techalerts/TA10-013A.html US Government Resource
http://www.vupen.com/english/advisories/2010/0103 Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=554293
https://exchange.xforce.ibmcloud.com/vulnerabilities/55557
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8539
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:3.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:3.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:4.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:4.0.5:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:4.0.5a:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:4.0.5c:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:5.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:5.0.5:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:5.0.6:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:5.0.10:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:6.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:6.0.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:6.0.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:6.0.3:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:6.0.4:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:6.0.5:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:6.0.6:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.3:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.4:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.5:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.6:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.7:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.8:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.9:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.1.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.1.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.1.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.1.3:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.1.4:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:8.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:8.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:8.1.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:8.1.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:8.1.3:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:8.1.4:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:8.1.5:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:8.1.6:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:8.1.7:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.1.3:*:*:*:*:*:*:*
OR cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
OR cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:3.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:3.01:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:3.02:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:4.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:4.0.5:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:4.0.5a:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:4.0.5c:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:4.5:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:5.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:5.0.5:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:5.0.6:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:5.0.7:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:5.0.9:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:5.0.10:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:5.0.11:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:5.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:6.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:6.0.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:6.0.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:6.0.3:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:6.0.4:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:6.0.5:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:7.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:7.0.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:7.0.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:7.0.3:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:7.0.4:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:7.0.5:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:7.0.6:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:7.0.7:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:7.0.8:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:7.0.9:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:7.1.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:7.1.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:7.1.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:7.1.3:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:8.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:8.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:8.1.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:8.1.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:8.1.4:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:8.1.5:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:8.1.6:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:8.1.7:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.1.3:*:*:*:*:*:*:*
OR cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*
cpe:2.3:o:unix:unix:*:*:*:*:*:*:*:*

History

21 Nov 2024, 01:08

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html - () http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html -
References () http://secunia.com/advisories/38138 - () http://secunia.com/advisories/38138 -
References () http://secunia.com/advisories/38215 - () http://secunia.com/advisories/38215 -
References () http://www.adobe.com/support/security/bulletins/apsb10-02.html - Patch, Vendor Advisory () http://www.adobe.com/support/security/bulletins/apsb10-02.html - Patch, Vendor Advisory
References () http://www.redhat.com/support/errata/RHSA-2010-0060.html - () http://www.redhat.com/support/errata/RHSA-2010-0060.html -
References () http://www.securityfocus.com/archive/1/508949 - () http://www.securityfocus.com/archive/1/508949 -
References () http://www.securityfocus.com/bid/37756 - () http://www.securityfocus.com/bid/37756 -
References () http://www.securitytracker.com/id?1023446 - () http://www.securitytracker.com/id?1023446 -
References () http://www.us-cert.gov/cas/techalerts/TA10-013A.html - US Government Resource () http://www.us-cert.gov/cas/techalerts/TA10-013A.html - US Government Resource
References () http://www.vupen.com/english/advisories/2010/0103 - Vendor Advisory () http://www.vupen.com/english/advisories/2010/0103 - Vendor Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=554293 - () https://bugzilla.redhat.com/show_bug.cgi?id=554293 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/55557 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/55557 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8539 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8539 -

Information

Published : 2010-01-13 19:30

Updated : 2024-11-21 01:08


NVD link : CVE-2009-3959

Mitre link : CVE-2009-3959

CVE.ORG link : CVE-2009-3959


JSON object : View

Products Affected

apple

  • mac_os_x

adobe

  • acrobat
  • acrobat_reader

unix

  • unix

microsoft

  • windows
CWE
CWE-189

Numeric Errors