CVE-2009-0927
KEV
🔴 Łataj teraz
Przepełnienie bufora w Adobe Reader i Acrobat umożliwia zdalne wykonanie kodu.
CVSS
8.8
EPSS
93.3%
Exploit
weaponized
Vendor
adobe
Opis źródłowy (NVD)
Stack-based buffer overflow in Adobe Reader and Adobe Acrobat 9 before 9.1, 8 before 8.1.3 , and 7 before 7.1.1 allows remote attackers to execute arbitrary code via a crafted argument to the getIcon method of a Collab object, a different vulnerability than CVE-2009-0658.
buffer-overflow
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 8.8 |
| CISA KEV (aktywnie wykorzystywane) | Tak |
| FIRST EPSS (prawdopodobieństwo exploita) | 93.3% |
| Opublikowano (NVD) | 2009-03-19 10:30:00 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-22 14:12:44 UTC |
Referencje
- http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00005.html (cve@mitre.org) [Mailing List, Third Party Advisory]
- http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html (cve@mitre.org) [Mailing List, Third Party Advisory]
- http://secunia.com/advisories/34490 (cve@mitre.org) [Third Party Advisory]
- http://secunia.com/advisories/34706 (cve@mitre.org) [Third Party Advisory]
- http://secunia.com/advisories/34790 (cve@mitre.org) [Third Party Advisory]
- http://security.gentoo.org/glsa/glsa-200904-17.xml (cve@mitre.org) [Third Party Advisory]
- http://sunsolve.sun.com/search/document.do?assetkey=1-66-256788-1 (cve@mitre.org) [Broken Link]
- http://www.adobe.com/support/security/bulletins/apsb09-04.html (cve@mitre.org) [Patch, Vendor Advisory]
- http://www.exploit-db.com/exploits/9579 (cve@mitre.org) [Third Party Advisory, VDB Entry]
- http://www.securityfocus.com/archive/1/502116/100/0/threaded (cve@mitre.org) [Third Party Advisory, VDB Entry]
- http://www.securityfocus.com/bid/34169 (cve@mitre.org) [Third Party Advisory, VDB Entry]
- http://www.securitytracker.com/id?1021861 (cve@mitre.org) [Third Party Advisory, VDB Entry]
- http://www.vupen.com/english/advisories/2009/0770 (cve@mitre.org) [Third Party Advisory]
- http://www.vupen.com/english/advisories/2009/1019 (cve@mitre.org) [Third Party Advisory]
- http://www.zerodayinitiative.com/advisories/ZDI-09-014 (cve@mitre.org) [Third Party Advisory, VDB Entry]
- https://exchange.xforce.ibmcloud.com/vulnerabilities/49312 (cve@mitre.org) [Third Party Advisory, VDB Entry]
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2009-0927 (134c704f-9b21-4f2e-91b3-4a467353bcc0) [US Government Resource]