CVE-2009-1492

high

Description

The getAnnots Doc method in the JavaScript API in Adobe Reader and Acrobat 9.1, 8.1.4, 7.1.1, and earlier allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a PDF file that contains an annotation, and has an OpenAction entry with JavaScript code that calls this method with crafted integer arguments.

References

https://www.exploit-db.com/exploits/8569

https://exchange.xforce.ibmcloud.com/vulnerabilities/50145

http://www.vupen.com/english/advisories/2009/1317

http://www.vupen.com/english/advisories/2009/1189

http://www.us-cert.gov/cas/techalerts/TA09-133B.html

http://www.securitytracker.com/id?1022139

http://www.redhat.com/support/errata/RHSA-2009-0478.html

http://www.kb.cert.org/vuls/id/970180

http://www.adobe.com/support/security/bulletins/apsb09-06.html

http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=926953

http://security.gentoo.org/glsa/glsa-200907-06.xml

http://secunia.com/advisories/35734

http://secunia.com/advisories/35416

http://secunia.com/advisories/35358

http://secunia.com/advisories/35152

http://secunia.com/advisories/35096

http://secunia.com/advisories/35055

http://secunia.com/advisories/34924

http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html

http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00001.html

http://blogs.adobe.com/psirt/2009/05/adobe_reader_issue_update.html

http://blogs.adobe.com/psirt/2009/04/update_on_adobe_reader_issue.html

http://blogs.adobe.com/psirt/2009/04/potential_adobe_reader_issue.html

Details

Source: Mitre, NVD

Published: 2009-04-30

Updated: 2018-11-08

Risk Information

CVSS v2

Base Score: 9.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Severity: High

CVSS v3

Base Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Severity: High