Summary
Adobe Reader and Acrobat are affected in the PDF parsing and heap-management code used to process crafted PDF files. An attacker can send or host a malicious PDF and rely on the victim to open it, which triggers memory corruption in the viewer. Successful exploitation can execute attacker-controlled code in the context of the user running the PDF application, and the issue was reported as exploited in the wild.
Why Fix Soon?
5/6Exploitation Details
Execute arbitrary code as the victim user
RCE (Remote Code Execution)Affected Software
| Product | Affected Versions |
|---|---|
| Adobe Reader | 7.x before 7.1.4, 8.x before 8.1.7, 9.x before 9.2 |
| Adobe Acrobat | 7.x before 7.1.4, 8.x before 8.1.7, 9.x before 9.2 |
Software for viewing, creating, and editing PDF documents.
Affected ComponentPDF parsing and custom heap management while processing crafted PDF content.
PDF parsing and custom heap management while processing crafted PDF content.
Not available
Not available
Probability of exploitation in the next 30 days
Worse than 99% of all CVEs
No known threat actors
No detection rules available
NVD Data
Description Summary
CVSS Base Score
CVSS Vector (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Affected Software (CPE) (78)
- •cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*
- •cpe:2.3:a:adobe:acrobat:3.0:*:*:*:*:*:*:*
- •cpe:2.3:a:adobe:acrobat:3.1:*:*:*:*:*:*:*
- •cpe:2.3:a:adobe:acrobat:4.0:*:*:*:*:*:*:*
- •cpe:2.3:a:adobe:acrobat:4.0.5:*:*:*:*:*:*:*
- •cpe:2.3:a:adobe:acrobat:4.0.5a:*:*:*:*:*:*:*
- •cpe:2.3:a:adobe:acrobat:4.0.5c:*:*:*:*:*:*:*
- •cpe:2.3:a:adobe:acrobat:5.0:*:*:*:*:*:*:*
- •cpe:2.3:a:adobe:acrobat:5.0.5:*:*:*:*:*:*:*
- •cpe:2.3:a:adobe:acrobat:5.0.6:*:*:*:*:*:*:*
- •cpe:2.3:a:adobe:acrobat:5.0.10:*:*:*:*:*:*:*
- •cpe:2.3:a:adobe:acrobat:6.0:*:*:*:*:*:*:*
- •cpe:2.3:a:adobe:acrobat:6.0.1:*:*:*:*:*:*:*
- •cpe:2.3:a:adobe:acrobat:6.0.2:*:*:*:*:*:*:*
- •cpe:2.3:a:adobe:acrobat:6.0.3:*:*:*:*:*:*:*
- •cpe:2.3:a:adobe:acrobat:6.0.4:*:*:*:*:*:*:*
- •cpe:2.3:a:adobe:acrobat:6.0.5:*:*:*:*:*:*:*
- •cpe:2.3:a:adobe:acrobat:7.0:*:*:*:*:*:*:*
- •cpe:2.3:a:adobe:acrobat:7.0.1:*:*:*:*:*:*:*
- •cpe:2.3:a:adobe:acrobat:7.0.2:*:*:*:*:*:*:*
- •cpe:2.3:a:adobe:acrobat:7.0.3:*:*:*:*:*:*:*
- •cpe:2.3:a:adobe:acrobat:7.0.4:*:*:*:*:*:*:*
- •cpe:2.3:a:adobe:acrobat:7.0.5:*:*:*:*:*:*:*
- •cpe:2.3:a:adobe:acrobat:7.0.6:*:*:*:*:*:*:*
- •cpe:2.3:a:adobe:acrobat:7.0.7:*:*:*:*:*:*:*
- •cpe:2.3:a:adobe:acrobat:7.0.8:*:*:*:*:*:*:*
- •cpe:2.3:a:adobe:acrobat:7.0.9:*:*:*:*:*:*:*
- •cpe:2.3:a:adobe:acrobat:7.1.3:*:*:*:*:*:*:*
- •cpe:2.3:a:adobe:acrobat:8.0:*:*:*:*:*:*:*
- •cpe:2.3:a:adobe:acrobat:8.1:*:*:*:*:*:*:*
- •cpe:2.3:a:adobe:acrobat:8.1.1:*:*:*:*:*:*:*
- •cpe:2.3:a:adobe:acrobat:8.1.2:*:*:*:*:*:*:*
- •cpe:2.3:a:adobe:acrobat:8.1.3:*:*:*:*:*:*:*
- •cpe:2.3:a:adobe:acrobat:8.1.4:*:*:*:*:*:*:*
- •cpe:2.3:a:adobe:acrobat:8.1.6:*:*:*:*:*:*:*
- •cpe:2.3:a:adobe:acrobat:9:*:*:*:*:*:*:*
- •cpe:2.3:a:adobe:acrobat:9.0.0:*:*:*:*:*:*:*
- •cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*
- •cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*
- •cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*
- •cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*
- •cpe:2.3:a:adobe:reader:3.0:*:*:*:*:*:*:*
- •cpe:2.3:a:adobe:reader:4.0:*:*:*:*:*:*:*
- •cpe:2.3:a:adobe:reader:4.0.5:*:*:*:*:*:*:*
- •cpe:2.3:a:adobe:reader:4.0.5a:*:*:*:*:*:*:*
- •cpe:2.3:a:adobe:reader:4.0.5c:*:*:*:*:*:*:*
- •cpe:2.3:a:adobe:reader:4.5:*:*:*:*:*:*:*
- •cpe:2.3:a:adobe:reader:5.0:*:*:*:*:*:*:*
- •cpe:2.3:a:adobe:reader:5.0.5:*:*:*:*:*:*:*
- •cpe:2.3:a:adobe:reader:5.0.6:*:*:*:*:*:*:*
- •cpe:2.3:a:adobe:reader:5.0.7:*:*:*:*:*:*:*
- •cpe:2.3:a:adobe:reader:5.0.9:*:*:*:*:*:*:*
- •cpe:2.3:a:adobe:reader:5.0.10:*:*:*:*:*:*:*
- •cpe:2.3:a:adobe:reader:5.0.11:*:*:*:*:*:*:*
- •cpe:2.3:a:adobe:reader:5.1:*:*:*:*:*:*:*
- •cpe:2.3:a:adobe:reader:6.0:*:*:*:*:*:*:*
- •cpe:2.3:a:adobe:reader:6.0.1:*:*:*:*:*:*:*
- •cpe:2.3:a:adobe:reader:6.0.2:*:*:*:*:*:*:*
- •cpe:2.3:a:adobe:reader:6.0.3:*:*:*:*:*:*:*
- •cpe:2.3:a:adobe:reader:6.0.4:*:*:*:*:*:*:*
- •cpe:2.3:a:adobe:reader:6.0.5:*:*:*:*:*:*:*
- •cpe:2.3:a:adobe:reader:7.0.1:*:*:*:*:*:*:*
- •cpe:2.3:a:adobe:reader:7.0.2:*:*:*:*:*:*:*
- •cpe:2.3:a:adobe:reader:7.0.3:*:*:*:*:*:*:*
- •cpe:2.3:a:adobe:reader:7.0.5:*:*:*:*:*:*:*
- •cpe:2.3:a:adobe:reader:7.0.7:*:*:*:*:*:*:*
- •cpe:2.3:a:adobe:reader:7.0.8:*:*:*:*:*:*:*
- •cpe:2.3:a:adobe:reader:7.0.9:*:*:*:*:*:*:*
- •cpe:2.3:a:adobe:reader:7.1.0:*:*:*:*:*:*:*
- •cpe:2.3:a:adobe:reader:7.1.1:*:*:*:*:*:*:*
- •cpe:2.3:a:adobe:reader:7.1.3:*:*:*:*:*:*:*
- •cpe:2.3:a:adobe:reader:8.1.1:*:*:*:*:*:*:*
- •cpe:2.3:a:adobe:reader:8.1.2:*:*:*:*:*:*:*
- •cpe:2.3:a:adobe:reader:8.1.4:*:*:*:*:*:*:*
- •cpe:2.3:a:adobe:reader:8.1.6:*:*:*:*:*:*:*
- •cpe:2.3:a:adobe:reader:9.0:*:*:*:*:*:*:*
- •cpe:2.3:a:adobe:reader:9.1:*:*:*:*:*:*:*
- •cpe:2.3:a:adobe:reader:9.1.2:*:*:*:*:*:*:*
Sources
| Source | Article |
|---|---|
| nvd.nist.gov | CVE-2009-3459 Detail |
| www.adobe.com | Security Updates Available for Adobe Reader and Acrobat |
| blogs.adobe.com | Adobe Reader and Acrobat Issue 1 |
| www.cisa.gov | Adobe Reader and Acrobat Vulnerabilities |
| www.tenable.com | CVE-2009-3459 |
| www.exploit-db.com | Adobe Reader's Custom Memory Management: a Heap of Trouble |
Priority History
Initial analysis