CVE-2009-4324
KEV
🔴 Łataj teraz
Wykorzystanie błędu use-after-free w Adobe Reader umożliwia zdalne wykonanie kodu przez złośliwy PDF.
CVSS
7.8
EPSS
92.9%
Exploit
weaponized
Vendor
adobe
Opis źródłowy (NVD)
Use-after-free vulnerability in the Doc.media.newPlayer method in Multimedia.api in Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, allows remote attackers to execute arbitrary code via a crafted PDF file using ZLib compressed streams, as exploited in the wild in December 2009.
exploit
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 7.8 |
| CISA KEV (aktywnie wykorzystywane) | Tak |
| FIRST EPSS (prawdopodobieństwo exploita) | 92.9% |
| Opublikowano (NVD) | 2009-12-15 02:30:00 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-21 21:12:37 UTC |
Referencje
- http://blogs.adobe.com/psirt/2009/12/new_adobe_reader_and_acrobat_v.html (psirt@adobe.com) [Broken Link, Vendor Advisory]
- http://contagiodump.blogspot.com/2009/12/virustotal-httpwww.html (psirt@adobe.com) [Exploit, Third Party Advisory]
- http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html (psirt@adobe.com) [Mailing List, Third Party Advisory]
- http://osvdb.org/60980 (psirt@adobe.com) [Broken Link]
- http://secunia.com/advisories/37690 (psirt@adobe.com) [Broken Link, Vendor Advisory]
- http://secunia.com/advisories/38138 (psirt@adobe.com) [Broken Link, Vendor Advisory]
- http://secunia.com/advisories/38215 (psirt@adobe.com) [Broken Link, Vendor Advisory]
- http://www.adobe.com/support/security/advisories/apsa09-07.html (psirt@adobe.com) [Vendor Advisory]
- http://www.adobe.com/support/security/bulletins/apsb10-02.html (psirt@adobe.com) [Not Applicable]
- http://www.kb.cert.org/vuls/id/508357 (psirt@adobe.com) [Third Party Advisory, US Government Resource]
- http://www.metasploit.com/redmine/projects/framework/repository/revisions/7881/entry/modules/exploits/windows/fileformat/adobe_media_newplayer.rb (psirt@adobe.com) [Broken Link]
- http://www.redhat.com/support/errata/RHSA-2010-0060.html (psirt@adobe.com) [Broken Link]
- http://www.securityfocus.com/bid/37331 (psirt@adobe.com) [Broken Link, Third Party Advisory, VDB Entry]
- http://www.shadowserver.org/wiki/pmwiki.php/Calendar/20091214 (psirt@adobe.com) [Broken Link]
- http://www.symantec.com/connect/blogs/zero-day-xmas-present (psirt@adobe.com) [Broken Link]
- http://www.us-cert.gov/cas/techalerts/TA10-013A.html (psirt@adobe.com) [Third Party Advisory, US Government Resource]
- http://www.vupen.com/english/advisories/2009/3518 (psirt@adobe.com) [Broken Link, Vendor Advisory]
- http://www.vupen.com/english/advisories/2010/0103 (psirt@adobe.com) [Broken Link]
- https://bugzilla.redhat.com/show_bug.cgi?id=547799 (psirt@adobe.com) [Issue Tracking]
- https://exchange.xforce.ibmcloud.com/vulnerabilities/54747 (psirt@adobe.com) [Third Party Advisory, VDB Entry]
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6795 (psirt@adobe.com) [Broken Link]
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2009-4324 (134c704f-9b21-4f2e-91b3-4a467353bcc0) [US Government Resource]