Vulnerability Details : CVE-2009-3459
Public exploit exists!
Heap-based buffer overflow in Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 allows remote attackers to execute arbitrary code via a crafted PDF file that triggers memory corruption, as exploited in the wild in October 2009. NOTE: some of these details are obtained from third party information.
Vulnerability category: OverflowMemory CorruptionExecute code
Exploit prediction scoring system (EPSS) score for CVE-2009-3459
Probability of exploitation activity in the next 30 days: 97.23%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 100 % EPSS Score History EPSS FAQ
Metasploit modules for CVE-2009-3459
-
Adobe FlateDecode Stream Predictor 02 Integer Overflow
Disclosure Date: 2009-10-08First seen: 2020-04-26exploit/windows/browser/adobe_flatedecode_predictor02This module exploits an integer overflow vulnerability in Adobe Reader and Adobe Acrobat Professional versions before 9.2. Authors: - unknown - jduck <jduck@metasploit.com> - jabra -
Adobe FlateDecode Stream Predictor 02 Integer Overflow
Disclosure Date: 2009-10-08First seen: 2020-04-26exploit/windows/fileformat/adobe_flatedecode_predictor02This module exploits an integer overflow vulnerability in Adobe Reader and Adobe Acrobat Professional versions before 9.2. Authors: - unknown - jduck <jduck@metasploit.com>
CVSS scores for CVE-2009-3459
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST |
CWE ids for CVE-2009-3459
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2009-3459
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6534
- http://securitytracker.com/id?1023007
-
http://www.adobe.com/support/security/bulletins/apsb09-15.html
Adobe - Security Bulletin APSB09-15 Security Updates Available for Adobe Reader and AcrobatPatch;Vendor Advisory
-
http://blogs.adobe.com/psirt/2009/10/adobe_reader_and_acrobat_issue_1.html
Adobe Product Security Incident Response Team (PSIRT) BlogVendor Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/53691
-
http://www.securityfocus.com/bid/36600
Adobe Acrobat Reader Remote Code Execution Vulnerability
-
http://www.iss.net/threats/348.html
-
http://www.vupen.com/english/advisories/2009/2898
Vendor Advisory
-
http://www.vupen.com/english/advisories/2009/2851
Vendor Advisory
-
http://isc.sans.org/diary.html?storyid=7300
-
http://www.us-cert.gov/cas/techalerts/TA09-286B.html
US Government Resource
Products affected by CVE-2009-3459
- cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:3.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:4.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:4.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:4.0.5a:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:4.0.5c:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:5.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:5.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:5.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:6.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:6.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:6.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:7.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:7.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:7.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:6.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:5.0.10:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:3.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:7.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:6.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:7.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:7.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:6.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:7.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:7.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:7.0.9:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:7.0.8:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:7.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:8.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:8.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:8.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:8.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:8.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:8.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:8.1.6:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:reader:5.0.10:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:reader:5.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:reader:6.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:reader:6.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:reader:7.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:reader:7.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:reader:4.0.5a:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:reader:4.0.5c:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:reader:4.5:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:reader:5.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:reader:5.0.11:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:reader:6.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:reader:6.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:reader:7.0.8:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:reader:8.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:reader:7.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:reader:4.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:reader:6.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:reader:5.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:reader:7.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:reader:8.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:reader:7.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:reader:8.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:reader:4.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:reader:5.0.9:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:reader:5.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:reader:6.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:reader:7.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:reader:7.0.9:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:reader:7.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:reader:5.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:reader:3.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:reader:9.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:reader:9.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:reader:8.1.6:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:reader:9.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:reader:7.1.3:*:*:*:*:*:*:*