ID

VAR-200912-0743


CVE

CVE-2009-3959


TITLE

Adobe Acrobat and Reader contain a use-after-free vulnerability in the JavaScript Doc.media.newPlayer method

Trust: 0.8

sources: CERT/CC: VU#508357

DESCRIPTION

Integer overflow in the U3D implementation in Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, allows remote attackers to execute arbitrary code via a malformed PDF document. An attacker can exploit this issue by supplying a malicious PDF file or webpage. Failed attempts will likely result in denial-of-service conditions. NOTE: This issue was previously covered in BID 37667 (Adobe Acrobat and Reader January 2010 Multiple Remote Vulnerabilities), but has been given its own record to better document it. The Adobe Reader browser plug-in is available for several web browsers and operating systems and will automatically open PDF documents on websites. They are used to create, view, search, digitally sign, verify, print, and collaborate on Adobe PDF files. II. III. AFFECTED PRODUCTS -------------------------------- Adobe Reader version 9.2 and prior Adobe Acrobat version 9.2 and prior IV. Exploits - PoCs & Binary Analysis ---------------------------------------- In-depth binary analysis of the vulnerability and a code execution exploit have been released by VUPEN Security through the VUPEN Exploits & PoCs Service : http://www.vupen.com/exploits V. SOLUTION ---------------- Upgrade to version 9.3 or 8.2. VI. CREDIT -------------- The vulnerability was discovered by Nicolas JOLY of VUPEN Security VII. ABOUT VUPEN Security --------------------------------- VUPEN is a leading IT security research company providing vulnerability management services to allow enterprises and organizations to eliminate vulnerabilities before they can be exploited, ensure security policy compliance and meaningfully measure and manage risks. VUPEN also provides research services for security vendors (antivirus, IDS, IPS,etc) to supplement their internal vulnerability research efforts and quickly develop vulnerability-based and exploit-based signatures, rules, and filters, and proactively protect their customers against potential threats. * VUPEN Vulnerability Notification Service: http://www.vupen.com/english/services * VUPEN Exploits and In-Depth Vulnerability Analysis: http://www.vupen.com/exploits VIII. REFERENCES ---------------------- http://www.vupen.com/english/advisories/2010/0103 http://www.adobe.com/support/security/bulletins/apsb10-02.html IX. DISCLOSURE TIMELINE ----------------------------------- 2009-11-06 - Vendor notified 2009-11-06 - Vendor response 2009-12-10 - Status update received 2010-01-07 - Status update received 2009-01-13 - Coordinated public Disclosure . ---------------------------------------------------------------------- Do you have VARM strategy implemented? (Vulnerability Assessment Remediation Management) If not, then implement it through the most reliable vulnerability intelligence source on the market. Implement it through Secunia. For more information visit: http://secunia.com/advisories/business_solutions/ Alternatively request a call from a Secunia representative today to discuss how we can help you with our capabilities contact us at: sales@secunia.com ---------------------------------------------------------------------- TITLE: Adobe Reader/Acrobat Code Execution Vulnerability SECUNIA ADVISORY ID: SA37690 VERIFY ADVISORY: http://secunia.com/advisories/37690/ DESCRIPTION: A vulnerability has been reported in Adobe Reader and Acrobat, which can be exploited by malicious people to compromise a user's system. NOTE: This vulnerability is currently being actively exploited. The vulnerability is reported in versions 9.2 and prior. SOLUTION: Do not open untrusted PDF files. Do not visit untrusted websites or follow untrusted links. PROVIDED AND/OR DISCOVERED BY: Reported as a 0-day. ORIGINAL ADVISORY: http://blogs.adobe.com/psirt/2009/12/new_adobe_reader_and_acrobat_v.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.97

sources: NVD: CVE-2009-3959 // CERT/CC: VU#508357 // JVNDB: JVNDB-2010-001020 // BID: 37756 // VULHUB: VHN-41405 // VULMON: CVE-2009-3959 // PACKETSTORM: 85207 // PACKETSTORM: 83870

AFFECTED PRODUCTS

vendor:adobemodel:acrobatscope:eqversion:8.1

Trust: 1.6

vendor:adobemodel:acrobatscope:eqversion:7.0.7

Trust: 1.6

vendor:adobemodel:acrobatscope:eqversion:7.1.3

Trust: 1.6

vendor:adobemodel:acrobatscope:eqversion:7.0.8

Trust: 1.6

vendor:adobemodel:acrobatscope:eqversion:7.1.1

Trust: 1.6

vendor:adobemodel:acrobatscope:eqversion:7.0.9

Trust: 1.6

vendor:adobemodel:acrobatscope:eqversion:7.1.2

Trust: 1.6

vendor:adobemodel:acrobatscope:eqversion:7.1.0

Trust: 1.6

vendor:adobemodel:acrobatscope:eqversion:7.1.4

Trust: 1.6

vendor:adobemodel:acrobatscope:eqversion:9.1.1

Trust: 1.3

vendor:adobemodel:acrobatscope:eqversion:5.0.10

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:9.1.2

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:7.0.3

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:6.0.3

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:5.0.6

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:3.01

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:4.0.5

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:4.0.5c

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:3.1

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:6.0.2

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:8.1.3

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:5.0.5

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:5.0

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:5.0.7

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.0.1

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:9.1

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.0.9

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:7.0.5

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:7.0

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.1.2

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:8.1.7

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:5.0.10

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.0.3

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:6.0.3

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:5.0.9

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:3.02

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:8.1.5

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:5.0.6

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:8.1.1

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:4.0.5c

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.0.7

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:8.0

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:6.0.2

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:5.0.5

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:6.0.4

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:9.1

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.0.5

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:7.0.2

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:8.1.7

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:9.1.1

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.1.1

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.1.0

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:8.1.2

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:6.0.1

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:8.1.5

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:8.1.1

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:3.0

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:8.0

Trust: 1.0

vendor:adobemodel:acrobatscope:lteversion:9.2

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:5.0.11

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:8.1.4

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:8.1.6

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:4.0.5a

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:7.0.6

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:7.0.4

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:9.1.3

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:6.0.6

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:6.0.4

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.0.8

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:6.0

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.0.2

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:9.0

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:4.0

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:8.1.2

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:6.0.1

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:6.0.5

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.1.3

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:5.1

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:3.0

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:9.1.2

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:4.5

Trust: 1.0

vendor:adobemodel:acrobat readerscope:lteversion:9.2

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:8.1.4

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:8.1.6

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:4.0.5a

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.0.6

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.0.4

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:9.1.3

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:4.0.5

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:6.0

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.0

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:5.0

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:9.0

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:8.1

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:4.0

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:7.0.1

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:6.0.5

Trust: 1.0

vendor:adobemodel: - scope: - version: -

Trust: 0.8

vendor:adobemodel:acrobatscope:ltversion:8.2

Trust: 0.8

vendor:adobemodel:acrobatscope:ltversion:9.3

Trust: 0.8

vendor:adobemodel:readerscope:ltversion:8.2

Trust: 0.8

vendor:adobemodel:readerscope:ltversion:9.3

Trust: 0.8

vendor:red hatmodel:enterprise linux extrasscope:eqversion:3 extras

Trust: 0.8

vendor:red hatmodel:enterprise linux extrasscope:eqversion:4 extras

Trust: 0.8

vendor:red hatmodel:enterprise linux extrasscope:eqversion:4.8.z extras

Trust: 0.8

vendor:red hatmodel:rhel desktop supplementaryscope:eqversion:5 (client)

Trust: 0.8

vendor:red hatmodel:rhel supplementaryscope:eqversion:5 (server)

Trust: 0.8

vendor:red hatmodel:rhel supplementary eusscope:eqversion:5.4.z (server)

Trust: 0.8

vendor:adobemodel:acrobatscope:eqversion:8.0.0

Trust: 0.6

vendor:adobemodel:acrobat professionalscope:eqversion:8.1.3

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:8.0

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:9.1.2

Trust: 0.3

vendor:susemodel:linux enterprise sp3scope:eqversion:10

Trust: 0.3

vendor:redhatmodel:enterprise linux supplementary serverscope:eqversion:5

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:9.2

Trust: 0.3

vendor:nortelmodel:networks callpilot 1002rpscope: - version: -

Trust: 0.3

vendor:redhatmodel:desktop extrasscope:eqversion:4

Trust: 0.3

vendor:redhatmodel:desktop extrasscope:eqversion:3

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:9.1.3

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:neversion:9.3

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:8.1.6

Trust: 0.3

vendor:redhatmodel:enterprise linux as extrasscope:eqversion:4

Trust: 0.3

vendor:redhatmodel:enterprise linux as extrasscope:eqversion:3

Trust: 0.3

vendor:nortelmodel:networks callpilot 1005rscope: - version: -

Trust: 0.3

vendor:nortelmodel:networks self-service peri applicationscope:eqversion:0

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:8.1.4

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:11.1

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:8.1

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:8.0

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:8.1.2

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:9.1.2

Trust: 0.3

vendor:adobemodel:acrobat standardscope:neversion:8.2

Trust: 0.3

vendor:nortelmodel:networks callpilot 600rscope: - version: -

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:9.1

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:8.1.3

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:8.1.5

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:9

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:8.1.7

Trust: 0.3

vendor:susemodel:linux enterprise sp2scope:eqversion:10

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:9.0

Trust: 0.3

vendor:adobemodel:acrobatscope:neversion:9.3

Trust: 0.3

vendor:adobemodel:acrobat standardscope:neversion:9.3

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:8.1.2

Trust: 0.3

vendor:adobemodel:readerscope:neversion:8.2

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:8.1.4

Trust: 0.3

vendor:nortelmodel:networks self-service speech serverscope:eqversion:0

Trust: 0.3

vendor:nortelmodel:networks callpilot 200iscope: - version: -

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:8.1.3

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:8.1

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:8.1.1

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:11.0

Trust: 0.3

vendor:adobemodel:acrobat professional security updatscope:eqversion:8.1.2

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:9.1

Trust: 0.3

vendor:redhatmodel:enterprise linux extrasscope:eqversion:4

Trust: 0.3

vendor:redhatmodel:enterprise linux extrasscope:eqversion:3

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:9

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop supplementary clientscope:eqversion:5

Trust: 0.3

vendor:adobemodel:reader security updatscope:eqversion:8.1.2

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:8.1.7

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:9.2

Trust: 0.3

vendor:adobemodel:readerscope:neversion:9.3

Trust: 0.3

vendor:nortelmodel:networks self-service mpsscope:eqversion:5000

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:8.1.4

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:9.1.3

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:8.1

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:9.1.1

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:8.1.6

Trust: 0.3

vendor:nortelmodel:networks callpilot 703tscope: - version: -

Trust: 0.3

vendor:susemodel:linux enterprise desktopscope:eqversion:11

Trust: 0.3

vendor:redhatmodel:enterprise linux ws extrasscope:eqversion:4

Trust: 0.3

vendor:redhatmodel:enterprise linux ws extrasscope:eqversion:3

Trust: 0.3

vendor:nortelmodel:networks callpilot 201iscope: - version: -

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:9.1

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:8.1.1

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:8.0

Trust: 0.3

vendor:redhatmodel:enterprise linux es extrasscope:eqversion:4

Trust: 0.3

vendor:redhatmodel:enterprise linux es extrasscope:eqversion:3

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:8.1.7

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:9.1.2

Trust: 0.3

vendor:nortelmodel:networks self-service mpsscope:eqversion:10000

Trust: 0.3

vendor:adobemodel:acrobatscope:eqversion:9.2

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:9.2

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:9.1.3

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:8.1.6

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:11.2

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:8.1.1

Trust: 0.3

vendor:nortelmodel:networks self-service media processing serverscope:eqversion:0

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:8.1.2

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:neversion:8.2

Trust: 0.3

sources: CERT/CC: VU#508357 // BID: 37756 // JVNDB: JVNDB-2010-001020 // CNNVD: CNNVD-201001-092 // NVD: CVE-2009-3959

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2009-3959
value: HIGH

Trust: 1.0

CARNEGIE MELLON: VU#508357
value: 65.84

Trust: 0.8

NVD: CVE-2009-3959
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201001-092
value: CRITICAL

Trust: 0.6

VULHUB: VHN-41405
value: HIGH

Trust: 0.1

VULMON: CVE-2009-3959
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2009-3959
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-41405
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#508357 // VULHUB: VHN-41405 // VULMON: CVE-2009-3959 // JVNDB: JVNDB-2010-001020 // CNNVD: CNNVD-201001-092 // NVD: CVE-2009-3959

PROBLEMTYPE DATA

problemtype:CWE-189

Trust: 1.9

sources: VULHUB: VHN-41405 // JVNDB: JVNDB-2010-001020 // NVD: CVE-2009-3959

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201001-092

TYPE

digital error

Trust: 0.6

sources: CNNVD: CNNVD-201001-092

CONFIGURATIONS

sources: JVNDB: JVNDB-2010-001020

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-41405

PATCH

title:APSB10-02url:http://www.adobe.com/support/security/bulletins/apsb10-02.html

Trust: 0.8

title:APSB10-02url:http://www.adobe.com/jp/support/security/bulletins/apsb10-02.html

Trust: 0.8

title:RHSA-2010:0037url:https://rhn.redhat.com/errata/RHSA-2010-0037.html

Trust: 0.8

title:RHSA-2010:0038url:https://rhn.redhat.com/errata/RHSA-2010-0038.html

Trust: 0.8

title:RHSA-2010:0060url:https://rhn.redhat.com/errata/RHSA-2010-0060.html

Trust: 0.8

title:TA10-013Aurl:http://software.fujitsu.com/jp/security/vulnerabilities/ta10-013a.html

Trust: 0.8

title:Red Hat: Critical: acroread security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20100037 - Security Advisory

Trust: 0.1

title:Red Hat: Critical: acroread security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20100038 - Security Advisory

Trust: 0.1

title:Red Hat: Critical: acroread security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20100060 - Security Advisory

Trust: 0.1

title: - url:https://github.com/0xCyberY/CVE-T4PDF

Trust: 0.1

sources: VULMON: CVE-2009-3959 // JVNDB: JVNDB-2010-001020

EXTERNAL IDS

db:NVDid:CVE-2009-3959

Trust: 3.0

db:VUPENid:ADV-2010-0103

Trust: 2.7

db:SECTRACKid:1023446

Trust: 2.6

db:USCERTid:TA10-013A

Trust: 2.6

db:BIDid:37756

Trust: 2.3

db:SECUNIAid:38215

Trust: 1.2

db:SECUNIAid:38138

Trust: 1.2

db:SECUNIAid:37690

Trust: 0.9

db:OSVDBid:60980

Trust: 0.8

db:CERT/CCid:VU#508357

Trust: 0.8

db:USCERTid:SA10-013A

Trust: 0.8

db:JVNDBid:JVNDB-2010-001020

Trust: 0.8

db:CNNVDid:CNNVD-201001-092

Trust: 0.7

db:CERT/CCid:TA10-013A

Trust: 0.6

db:SUSEid:SUSE-SA:2010:008

Trust: 0.6

db:NSFOCUSid:14342

Trust: 0.6

db:PACKETSTORMid:85207

Trust: 0.2

db:VULHUBid:VHN-41405

Trust: 0.1

db:VULMONid:CVE-2009-3959

Trust: 0.1

db:PACKETSTORMid:83870

Trust: 0.1

sources: CERT/CC: VU#508357 // VULHUB: VHN-41405 // VULMON: CVE-2009-3959 // BID: 37756 // JVNDB: JVNDB-2010-001020 // PACKETSTORM: 85207 // PACKETSTORM: 83870 // CNNVD: CNNVD-201001-092 // NVD: CVE-2009-3959

REFERENCES

url:http://www.vupen.com/english/advisories/2010/0103

Trust: 2.7

url:http://www.us-cert.gov/cas/techalerts/ta10-013a.html

Trust: 2.6

url:http://www.securitytracker.com/id?1023446

Trust: 2.6

url:http://www.adobe.com/support/security/bulletins/apsb10-02.html

Trust: 2.2

url:http://www.securityfocus.com/bid/37756

Trust: 2.1

url:http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html

Trust: 1.8

url:http://blogs.adobe.com/psirt/2009/12/new_adobe_reader_and_acrobat_v.html

Trust: 1.7

url:http://www.securityfocus.com/archive/1/508949

Trust: 1.2

url:https://bugzilla.redhat.com/show_bug.cgi?id=554293

Trust: 1.2

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a8539

Trust: 1.2

url:http://www.redhat.com/support/errata/rhsa-2010-0060.html

Trust: 1.2

url:http://secunia.com/advisories/38138

Trust: 1.2

url:http://secunia.com/advisories/38215

Trust: 1.2

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/55557

Trust: 1.2

url:http://secunia.com/advisories/37690/

Trust: 0.9

url:http://www.adobe.com/support/security/advisories/apsa09-07.html

Trust: 0.8

url:http://kb2.adobe.com/cps/532/cpsid_53237.html

Trust: 0.8

url:http://osvdb.org/show/osvdb/60980

Trust: 0.8

url:http://www.symantec.com/connect/blogs/zero-day-xmas-present

Trust: 0.8

url:http://voices.washingtonpost.com/securityfix/2009/12/hackers_target_unpatched_adobe.html

Trust: 0.8

url:http://vrt-sourcefire.blogspot.com/2009/12/this-is-what-happens-when-you-try-to-do.html

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-3959

Trust: 0.8

url:http://www.ipa.go.jp/security/ciadr/vul/20100113-adobe.html

Trust: 0.8

url:http://www.jpcert.or.jp/at/2010/at100003.txt

Trust: 0.8

url:http://jvn.jp/cert/jvnta10-013a/

Trust: 0.8

url:http://jvn.jp/tr/jvntr-2010-03/

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-3959

Trust: 0.8

url:http://www.us-cert.gov/cas/alerts/sa10-013a.html

Trust: 0.8

url:http://www.npa.go.jp/cyberpolice/index.html#topics

Trust: 0.8

url:http://www.nsfocus.net/vulndb/14342

Trust: 0.6

url:http://www.adobe.com

Trust: 0.3

url:http://support.nortel.com/go/main.jsp?cscat=bltndetail&id=991610

Trust: 0.3

url:/archive/1/508949

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/189.html

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2010:0037

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:http://www.vupen.com/english/research.php

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-3959

Trust: 0.1

url:http://www.vupen.com/exploits

Trust: 0.1

url:http://www.vupen.com/english/services

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/business_solutions/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: CERT/CC: VU#508357 // VULHUB: VHN-41405 // VULMON: CVE-2009-3959 // BID: 37756 // JVNDB: JVNDB-2010-001020 // PACKETSTORM: 85207 // PACKETSTORM: 83870 // CNNVD: CNNVD-201001-092 // NVD: CVE-2009-3959

CREDITS

Nicolas Joly

Trust: 0.7

sources: PACKETSTORM: 85207 // CNNVD: CNNVD-201001-092

SOURCES

db:CERT/CCid:VU#508357
db:VULHUBid:VHN-41405
db:VULMONid:CVE-2009-3959
db:BIDid:37756
db:JVNDBid:JVNDB-2010-001020
db:PACKETSTORMid:85207
db:PACKETSTORMid:83870
db:CNNVDid:CNNVD-201001-092
db:NVDid:CVE-2009-3959

LAST UPDATE DATE

2024-11-23T19:23:32.676000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#508357date:2010-06-18T00:00:00
db:VULHUBid:VHN-41405date:2018-10-30T00:00:00
db:VULMONid:CVE-2009-3959date:2018-10-30T00:00:00
db:BIDid:37756date:2010-02-01T21:31:00
db:JVNDBid:JVNDB-2010-001020date:2010-02-10T00:00:00
db:CNNVDid:CNNVD-201001-092date:2011-07-19T00:00:00
db:NVDid:CVE-2009-3959date:2024-11-21T01:08:36.613

SOURCES RELEASE DATE

db:CERT/CCid:VU#508357date:2009-12-15T00:00:00
db:VULHUBid:VHN-41405date:2010-01-13T00:00:00
db:VULMONid:CVE-2009-3959date:2010-01-13T00:00:00
db:BIDid:37756date:2010-01-12T00:00:00
db:JVNDBid:JVNDB-2010-001020date:2010-02-10T00:00:00
db:PACKETSTORMid:85207date:2010-01-16T01:01:58
db:PACKETSTORMid:83870date:2009-12-15T13:39:57
db:CNNVDid:CNNVD-201001-092date:2010-01-13T00:00:00
db:NVDid:CVE-2009-3959date:2010-01-13T19:30:00.593