CVE-2009-0658

Properties

Published:
19.02.2009
Updated:
28.04.2009
Patch available:
Severity:
High
CVSS vector:
(AV:N/AC:M/Au:N/C:C/I:C/A:C)
Product:
adobe: reader
adobe: reader
adobe: acrobat_reader
adobe: acrobat_reader
adobe: acrobat_reader
adobe: acrobat_reader
adobe: acrobat_reader
adobe: acrobat_reader
adobe: acrobat_reader
adobe: acrobat_reader
adobe: acrobat_reader
adobe: acrobat_reader
adobe: acrobat_reader
adobe: acrobat_reader
adobe: acrobat_reader
adobe: acrobat_reader
adobe: acrobat_reader
adobe: acrobat_reader
adobe: acrobat_reader
adobe: acrobat_reader
adobe: acrobat_reader
adobe: acrobat_reader
adobe: acrobat_reader
adobe: acrobat_reader
adobe: acrobat_reader
adobe: acrobat_reader
adobe: acrobat_reader
adobe: acrobat_reader
adobe: acrobat_reader
adobe: acrobat_reader
adobe: acrobat_reader
adobe: acrobat_reader
adobe: acrobat_reader
adobe: acrobat_reader
adobe: acrobat_reader

Vulnerability description

Buffer overflow in Adobe Reader 9.0 and earlier, and Acrobat 9.0 and earlier, allows remote attackers to execute arbitrary code via a crafted PDF document, related to a non-JavaScript function call and possibly an embedded JBIG2 image stream, as exploited in the wild in February 2009 by Trojan.Pidief.E.

References:

CERT: http://www.us-cert.gov/cas/techalerts/TA09-051A.html
CERT-VN: http://www.kb.cert.org/vuls/id/905281
XF: http://xforce.iss.net/xforce/xfdb/48825
VUPEN: http://www.vupen.com/english/advisories/2009/1019
MISC: http://www.symantec.com/security_response/writeup.jsp?docid=2009-021212-5523-99&tabid=2
MISC: http://www.shadowserver.org/wiki/pmwiki.php?n=Calendar.20090219
SECTRACK: http://www.securitytracker.com/id?1021739
BID: http://www.securityfocus.com/bid/33751
REDHAT: http://www.redhat.com/support/errata/RHSA-2009-0376.html
MILW0RM: http://www.milw0rm.com/exploits/8099
MILW0RM: http://www.milw0rm.com/exploits/8090
FRSIRT: http://www.frsirt.com/english/advisories/2009/0472
CONFIRM: http://www.adobe.com/support/security/bulletins/apsb09-04.html
CONFIRM: http://www.adobe.com/support/security/advisories/apsa09-01.html
SUNALERT: http://sunsolve.sun.com/search/document.do?assetkey=1-66-256788-1
GENTOO: http://security.gentoo.org/glsa/glsa-200904-17.xml
SECUNIA: http://secunia.com/advisories/34790
SECUNIA: http://secunia.com/advisories/34706
SECUNIA: http://secunia.com/advisories/34490
SECUNIA: http://secunia.com/advisories/34392
SECUNIA: http://secunia.com/advisories/33901
OVAL: http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:5697
OSVDB: http://osvdb.org/52073
SUSE: http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html
SUSE: http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00005.html
MISC: http://isc.sans.org/diary.html?n&storyid=5902