Vulnerability Details : CVE-2009-1492
The getAnnots Doc method in the JavaScript API in Adobe Reader and Acrobat 9.1, 8.1.4, 7.1.1, and earlier allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a PDF file that contains an annotation, and has an OpenAction entry with JavaScript code that calls this method with crafted integer arguments.
Vulnerability category: Memory CorruptionExecute codeDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2009-1492
Probability of exploitation activity in the next 30 days: 96.04%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 99 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2009-1492
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST |
CWE ids for CVE-2009-1492
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2009-1492
-
http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00001.html
Mailing List;Third Party Advisory
-
http://www.securityfocus.com/bid/34736
Exploit;Third Party Advisory;VDB Entry
-
http://www.adobe.com/support/security/bulletins/apsb09-06.html
Vendor Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html
[security-announce] SUSE Security Summary Report: SUSE-SR:2009:011 - openSUSE Security Announce - openSUSE Mailing ListsMailing List;Third Party Advisory
-
http://sunsolve.sun.com/search/document.do?assetkey=1-66-259028-1
Broken Link
-
http://www.vupen.com/english/advisories/2009/1189
Third Party Advisory
-
http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=926953
Third Party Advisory
-
http://security.gentoo.org/glsa/glsa-200907-06.xml
Third Party Advisory
-
http://www.vupen.com/english/advisories/2009/1317
Third Party Advisory
-
http://www.us-cert.gov/cas/techalerts/TA09-133B.html
Third Party Advisory;US Government Resource
-
http://www.kb.cert.org/vuls/id/970180
Third Party Advisory;US Government Resource
-
http://blogs.adobe.com/psirt/2009/05/adobe_reader_issue_update.html
Vendor Advisory
-
http://www.redhat.com/support/errata/RHSA-2009-0478.html
Third Party Advisory
-
http://blogs.adobe.com/psirt/2009/04/potential_adobe_reader_issue.html
Vendor Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/50145
Third Party Advisory;VDB Entry
-
http://packetstorm.linuxsecurity.com/0904-exploits/getannots.txt
Exploit;Third Party Advisory
-
http://www.securitytracker.com/id?1022139
Third Party Advisory;VDB Entry
-
http://blogs.adobe.com/psirt/2009/04/update_on_adobe_reader_issue.html
Vendor Advisory
-
https://www.exploit-db.com/exploits/8569
Third Party Advisory;VDB Entry
Products affected by CVE-2009-1492
- cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*