Lucene search

K
nvd[email protected]NVD:CVE-2009-0928
HistoryMar 25, 2009 - 1:30 a.m.

CVE-2009-0928

2009-03-2501:30:00
CWE-119
web.nvd.nist.gov
9

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

AI Score

8

Confidence

High

EPSS

0.561

Percentile

97.7%

Heap-based buffer overflow in Adobe Acrobat Reader and Acrobat Professional 7.1.0, 8.1.3, 9.0.0, and other versions allows remote attackers to execute arbitrary code via a PDF file containing a JBIG2 stream with a size inconsistency related to an unspecified table.

Affected configurations

Nvd
Node
adobeacrobatRange≀9.0
OR
adobeacrobatMatch3.0
OR
adobeacrobatMatch3.1
OR
adobeacrobatMatch4.0
OR
adobeacrobatMatch4.0.5
OR
adobeacrobatMatch4.0.5a
OR
adobeacrobatMatch4.0.5c
OR
adobeacrobatMatch5.0
OR
adobeacrobatMatch5.0.5
OR
adobeacrobatMatch5.0.6
OR
adobeacrobatMatch5.0.10
OR
adobeacrobatMatch6.0
OR
adobeacrobatMatch6.0.1
OR
adobeacrobatMatch6.0.2
OR
adobeacrobatMatch6.0.3
OR
adobeacrobatMatch6.0.4
OR
adobeacrobatMatch6.0.5
OR
adobeacrobatMatch6.0.6
OR
adobeacrobatMatch7.0
OR
adobeacrobatMatch7.0.1
OR
adobeacrobatMatch7.0.2
OR
adobeacrobatMatch7.0.3
OR
adobeacrobatMatch7.0.4
OR
adobeacrobatMatch7.0.5
OR
adobeacrobatMatch7.0.6
OR
adobeacrobatMatch7.0.7
OR
adobeacrobatMatch7.0.8
OR
adobeacrobatMatch7.0.9
OR
adobeacrobatMatch7.1.0
OR
adobeacrobatMatch7.1.1
OR
adobeacrobatMatch7.1.2
OR
adobeacrobatMatch7.1.3
OR
adobeacrobatMatch7.1.4
OR
adobeacrobatMatch8.0
OR
adobeacrobatMatch8.1
OR
adobeacrobatMatch8.1.1
OR
adobeacrobatMatch8.1.2
OR
adobeacrobatMatch8.1.3
OR
adobeacrobatMatch8.1.4
OR
adobeacrobatMatch8.1.5
OR
adobeacrobatMatch8.1.6
OR
adobeacrobatMatch8.1.7
OR
adobeacrobatMatch8.2
OR
adobeacrobatMatch8.2.1
OR
adobeacrobatMatch8.2.2
OR
adobeacrobatMatch8.2.3
OR
adobeacrobatMatch8.2.4
Node
adobeacrobat_readerRange≀9.0
OR
adobeacrobat_readerMatch3.0
OR
adobeacrobat_readerMatch3.01
OR
adobeacrobat_readerMatch3.02
OR
adobeacrobat_readerMatch4.0
OR
adobeacrobat_readerMatch4.0.5
OR
adobeacrobat_readerMatch4.0.5a
OR
adobeacrobat_readerMatch4.0.5c
OR
adobeacrobat_readerMatch4.5
OR
adobeacrobat_readerMatch5.0
OR
adobeacrobat_readerMatch5.0.5
OR
adobeacrobat_readerMatch5.0.6
OR
adobeacrobat_readerMatch5.0.7
OR
adobeacrobat_readerMatch5.0.9
OR
adobeacrobat_readerMatch5.0.10
OR
adobeacrobat_readerMatch5.0.11
OR
adobeacrobat_readerMatch5.1
OR
adobeacrobat_readerMatch6.0
OR
adobeacrobat_readerMatch6.0.1
OR
adobeacrobat_readerMatch6.0.2
OR
adobeacrobat_readerMatch6.0.3
OR
adobeacrobat_readerMatch6.0.4
OR
adobeacrobat_readerMatch6.0.5
OR
adobeacrobat_readerMatch6.0.6
OR
adobeacrobat_readerMatch7.0
OR
adobeacrobat_readerMatch7.0.1
OR
adobeacrobat_readerMatch7.0.2
OR
adobeacrobat_readerMatch7.0.3
OR
adobeacrobat_readerMatch7.0.4
OR
adobeacrobat_readerMatch7.0.5
OR
adobeacrobat_readerMatch7.0.6
OR
adobeacrobat_readerMatch7.0.7
OR
adobeacrobat_readerMatch7.0.8
OR
adobeacrobat_readerMatch7.0.9
OR
adobeacrobat_readerMatch7.1.0
OR
adobeacrobat_readerMatch7.1.1
OR
adobeacrobat_readerMatch7.1.2
OR
adobeacrobat_readerMatch7.1.3
OR
adobeacrobat_readerMatch7.1.4
OR
adobeacrobat_readerMatch8.0
OR
adobeacrobat_readerMatch8.1
OR
adobeacrobat_readerMatch8.1.1
OR
adobeacrobat_readerMatch8.1.2
OR
adobeacrobat_readerMatch8.1.4
OR
adobeacrobat_readerMatch8.1.5
OR
adobeacrobat_readerMatch8.1.6
OR
adobeacrobat_readerMatch8.1.7
OR
adobeacrobat_readerMatch8.2
OR
adobeacrobat_readerMatch8.2.1
OR
adobeacrobat_readerMatch8.2.2
OR
adobeacrobat_readerMatch8.2.3
OR
adobeacrobat_readerMatch8.2.4

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

AI Score

8

Confidence

High

EPSS

0.561

Percentile

97.7%