ID CVE-2009-4324
Summary Use-after-free vulnerability in the Doc.media.newPlayer method in Multimedia.api in Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, allows remote attackers to execute arbitrary code via a crafted PDF file using ZLib compressed streams, as exploited in the wild in December 2009.
References
Vulnerable Configurations
  • cpe:2.3:a:adobe:acrobat:6.0:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat:6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat:6.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat:6.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat:6.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat:6.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat:6.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat:6.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat:6.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat:6.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat:6.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat:6.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat:7.0:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat:7.0:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat:7.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat:7.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat:7.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat:7.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat:7.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat:7.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat:7.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat:7.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat:7.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat:7.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat:7.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat:7.0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat:7.0.7:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat:7.0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat:7.0.8:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat:7.0.8:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat:7.0.9:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat:7.0.9:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat:8.0:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat:8.0:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat:8.1:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat:8.1:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat:8.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat:8.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat:8.1.2:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat:8.1.2:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:3.0:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:4.0:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:4.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:4.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:4.0.5a:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:4.0.5a:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:4.0.5c:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:4.0.5c:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:4.5:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:4.5:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:5.0:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:5.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:5.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:5.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:5.0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:5.0.7:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:5.0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:5.0.9:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:5.0.9:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:5.0.10:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:5.0.10:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:5.0.11:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:5.0.11:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:5.1:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:6.0:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:6.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:6.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:6.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:6.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:6.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:6.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:6.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:6.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:6.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:6.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:7.0:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:7.0:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:7.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:7.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:7.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:7.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:7.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:7.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:7.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:7.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:7.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:7.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:7.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:7.0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:7.0.7:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:7.0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:7.0.8:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:7.0.8:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:7.0.9:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:7.0.9:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:8.0:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:8.0:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:8.1:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:8.1:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:8.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:8.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:8.1.2:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:8.1.2:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:-:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:-:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:-:*:*:*:classic:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:-:*:*:*:classic:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:3.01:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:3.01:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:3.02:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:3.02:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:7.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:7.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:7.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:7.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:8.1.3:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:8.1.3:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:8.1.4:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:8.1.4:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:8.1.5:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:8.1.5:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:8.1.6:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:8.1.6:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:8.1.7:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:8.1.7:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:8.2:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:8.2:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:8.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:8.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:8.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:8.2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:8.2.3:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:8.2.3:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:8.2.4:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:8.2.4:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:8.2.6:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:8.2.6:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:8.3:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:8.3:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:9.1.3:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:9.1.3:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:9.2:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:9.2:*:*:*:*:*:*:*
CVSS
Base: 9.3 (as of 30-10-2018 - 16:25)
Impact:
Exploitability:
CWE CWE-399
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:N/AC:M/Au:N/C:C/I:C/A:C
oval via4
accepted 2013-08-12T04:09:43.785-04:00
class vulnerability
contributors
  • name J. Daniel Brown
    organization DTCC
  • name Benjamin Marandel
    organization Marandel.net
  • name SecPod Team
    organization SecPod Technologies
  • name SecPod Team
    organization SecPod Technologies
  • name Shane Shaffer
    organization G2, Inc.
  • name Sergey Artykhov
    organization ALTX-SOFT
  • name Sergey Artykhov
    organization ALTX-SOFT
  • name Shane Shaffer
    organization G2, Inc.
  • name Maria Kedovskaya
    organization ALTX-SOFT
  • name Maria Kedovskaya
    organization ALTX-SOFT
  • name Maria Kedovskaya
    organization ALTX-SOFT
  • name Maria Kedovskaya
    organization ALTX-SOFT
definition_extensions
  • comment Adobe Reader 8 Series is installed
    oval oval:org.mitre.oval:def:6390
  • comment Adobe Reader 9 Series is installed
    oval oval:org.mitre.oval:def:6523
  • comment Adobe Acrobat 8 Series is installed
    oval oval:org.mitre.oval:def:6452
  • comment Adobe Acrobat 9 Series is installed
    oval oval:org.mitre.oval:def:6013
description Use-after-free vulnerability in the Doc.media.newPlayer method in Multimedia.api in Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, allows remote attackers to execute arbitrary code via a crafted PDF file using ZLib compressed streams, as exploited in the wild in December 2009.
family windows
id oval:org.mitre.oval:def:6795
status accepted
submitted 2009-12-15T17:00:00
title Adobe Reader and Acrobat Unspecified Code Execution Vulnerability
version 19
redhat via4
advisories
rhsa
id RHSA-2010:0060
rpms
  • acroread-0:9.3-1.el5
  • acroread-plugin-0:9.3-1.el5
  • acroread-0:9.3-1.el4
  • acroread-uninstall-0:9.3-3
refmap via4
bid 37331
cert TA10-013A
cert-vn VU#508357
confirm
misc
osvdb 60980
secunia
  • 37690
  • 38138
  • 38215
suse SUSE-SA:2010:008
vupen
  • ADV-2009-3518
  • ADV-2010-0103
xf acro-reader-unspecifed-code-execution(54747)
saint via4
bid 37331
description Adobe Reader media.newPlayer Use-After-Free Code Execution
id misc_acroread
osvdb 60980
title adobe_reader_media_newplayer
type client
Last major update 30-10-2018 - 16:25
Published 15-12-2009 - 02:30
Last modified 30-10-2018 - 16:25
Back to Top