CVE-2012-0777

The JavaScript API in Adobe Reader and Acrobat 9.x before 9.5.1 and 10.x before 10.1.3 on Mac OS X and Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00013.html Broken Link Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00016.html Broken Link Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00017.html Broken Link Mailing List Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2012-0469.html Third Party Advisory
http://secunia.com/advisories/48756 Broken Link
http://secunia.com/advisories/48846 Broken Link
http://www.adobe.com/support/security/bulletins/apsb12-08.html Vendor Advisory
http://www.securityfocus.com/bid/52950 Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1026908 Broken Link Third Party Advisory VDB Entry
http://www.us-cert.gov/cas/techalerts/TA12-101B.html Mitigation Third Party Advisory US Government Resource
https://exchange.xforce.ibmcloud.com/vulnerabilities/74735 Third Party Advisory VDB Entry
http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00013.html Broken Link Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00016.html Broken Link Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00017.html Broken Link Mailing List Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2012-0469.html Third Party Advisory
http://secunia.com/advisories/48756 Broken Link
http://secunia.com/advisories/48846 Broken Link
http://www.adobe.com/support/security/bulletins/apsb12-08.html Vendor Advisory
http://www.securityfocus.com/bid/52950 Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1026908 Broken Link Third Party Advisory VDB Entry
http://www.us-cert.gov/cas/techalerts/TA12-101B.html Mitigation Third Party Advisory US Government Resource
https://exchange.xforce.ibmcloud.com/vulnerabilities/74735 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*
OR cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
OR cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*
OR cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*

History

21 Nov 2024, 01:35

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00013.html - Broken Link, Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00013.html - Broken Link, Mailing List, Third Party Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00016.html - Broken Link, Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00016.html - Broken Link, Mailing List, Third Party Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00017.html - Broken Link, Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00017.html - Broken Link, Mailing List, Third Party Advisory
References () http://rhn.redhat.com/errata/RHSA-2012-0469.html - Third Party Advisory () http://rhn.redhat.com/errata/RHSA-2012-0469.html - Third Party Advisory
References () http://secunia.com/advisories/48756 - Broken Link () http://secunia.com/advisories/48756 - Broken Link
References () http://secunia.com/advisories/48846 - Broken Link () http://secunia.com/advisories/48846 - Broken Link
References () http://www.adobe.com/support/security/bulletins/apsb12-08.html - Vendor Advisory () http://www.adobe.com/support/security/bulletins/apsb12-08.html - Vendor Advisory
References () http://www.securityfocus.com/bid/52950 - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/52950 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id?1026908 - Broken Link, Third Party Advisory, VDB Entry () http://www.securitytracker.com/id?1026908 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.us-cert.gov/cas/techalerts/TA12-101B.html - Mitigation, Third Party Advisory, US Government Resource () http://www.us-cert.gov/cas/techalerts/TA12-101B.html - Mitigation, Third Party Advisory, US Government Resource
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/74735 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/74735 - Third Party Advisory, VDB Entry

Information

Published : 2012-04-10 23:55

Updated : 2024-11-21 01:35


NVD link : CVE-2012-0777

Mitre link : CVE-2012-0777

CVE.ORG link : CVE-2012-0777


JSON object : View

Products Affected

adobe

  • acrobat_reader
  • acrobat

apple

  • mac_os_x

linux

  • linux_kernel
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer