ID

VAR-200912-0751


CVE

CVE-2009-3955


TITLE

Adobe Reader and Acrobat JpxDecode Memory Corruption Vulnerability

Trust: 0.9

sources: BID: 37757 // CNNVD: CNNVD-201001-089

DESCRIPTION

Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, allows remote attackers to execute arbitrary code via a crafted JPC_MS_RGN marker in the Jp2c stream of a JpxDecode encoded data stream, which triggers an integer sign extension that bypasses a sanity check, leading to memory corruption. The Doc.media.newPlayer method in Adobe Acrobat and Reader contains a use-after-free vulnerability, which may allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system. Adobe Reader and Acrobat are prone to a memory-corruption vulnerability. An attacker can exploit this issue to execute arbitrary code. Failed exploit attempts will likely cause denial-of-service conditions. This issue affects Reader and Acrobat 9.2 and prior versions. NOTE: This issue was previously covered in BID 37667 (Adobe Acrobat and Reader January 2010 Multiple Remote Vulnerabilities), but has been given its own record to better document it. iDefense Security Advisory 01.12.10 http://labs.idefense.com/intelligence/vulnerabilities/ Jan 12, 2010 I. For more information, please visit following pages: http://www.adobe.com/products/reader/ http://www.adobe.com/products/acrobat/ II. The vulnerability occurs when processing the Jp2c stream of a JpxDecode encoded data stream within a PDF file. During the processing of a JPC_MS_RGN marker, an integer sign extension may cause a bounds check to be bypassed. This results in an exploitable memory corruption vulnerability. III. The attacker will have to create a malicious PDF file and convince the victim to open it. This can be accomplished by embedding the PDF file into an IFrame inside of a Web page, which will result in automatic exploitation once the page is viewed. The file could also be e-mailed as an attachment or placed on a file share. In these cases, a user would have to manually open the file to trigger exploitation. If preview is enabled in Windows Explorer, Acrobat will try to generate a preview for PDF files when a folder containing PDF files is accessed, thus triggering the exploitation. IV. DETECTION iDefense has confirmed the existence of this vulnerability in latest version of Adobe Reader, at the time of testing, version 9.1.0. Previous versions may also be affected. Adobe has stated that all 9.2 and below versions, as well as all 8.1.7 and below versions are vulnerable. V. WORKAROUND None of the following workarounds will prevent exploitation, but they can reduce potential attack vectors and make exploitation more difficult. Prevent PDF documents from being opened automatically by the Web browser Disable JavaScript Disable PDFShell extension by removing or renaming the Acrord32info.exe file VI. VENDOR RESPONSE Adobe has released a patch which addresses this issue. Information about downloadable vendor updates can be found by clicking on the URLs shown. http://www.adobe.com/support/security/bulletins/apsb10-02.html VII. CVE INFORMATION The Common Vulnerabilities and Exposures (CVE) project has assigned the name CVE-2009-3955 to this issue. This is a candidate for inclusion in the CVE list (http://cve.mitre.org/), which standardizes names for security problems. VIII. DISCLOSURE TIMELINE 08/06/2009 Initial Contact 08/06/2009 Initial Response 09/16/2009 Vendor requested POC. iDefense sent POC. 09/17/2009 Vendor response. 01/12/2010 Coordinated public disclosure. IX. CREDIT This vulnerability was reported to iDefense by Code Audit Labs http://www.vulnhunt.com. Get paid for vulnerability research http://labs.idefense.com/methodology/vulnerability/vcp.php Free tools, research and upcoming events http://labs.idefense.com/ X. LEGAL NOTICES Copyright \xa9 2010 iDefense, Inc. Permission is granted for the redistribution of this alert electronically. It may not be edited in any way without the express written consent of iDefense. If you wish to reprint the whole or any part of this alert in any other medium other than electronically, please e-mail customerservice@idefense.com for permission. Disclaimer: The information in the advisory is believed to be accurate at the time of publishing based on currently available information. Use of the information constitutes acceptance for use in an AS IS condition. There are no warranties with regard to this information. Neither the author nor the publisher accepts any liability for any direct, indirect, or consequential loss or damage arising from use of, or reliance on, this information. ---------------------------------------------------------------------- Do you have VARM strategy implemented? (Vulnerability Assessment Remediation Management) If not, then implement it through the most reliable vulnerability intelligence source on the market. Implement it through Secunia. For more information visit: http://secunia.com/advisories/business_solutions/ Alternatively request a call from a Secunia representative today to discuss how we can help you with our capabilities contact us at: sales@secunia.com ---------------------------------------------------------------------- TITLE: Adobe Reader/Acrobat Code Execution Vulnerability SECUNIA ADVISORY ID: SA37690 VERIFY ADVISORY: http://secunia.com/advisories/37690/ DESCRIPTION: A vulnerability has been reported in Adobe Reader and Acrobat, which can be exploited by malicious people to compromise a user's system. NOTE: This vulnerability is currently being actively exploited. SOLUTION: Do not open untrusted PDF files. Do not visit untrusted websites or follow untrusted links. PROVIDED AND/OR DISCOVERED BY: Reported as a 0-day. ORIGINAL ADVISORY: http://blogs.adobe.com/psirt/2009/12/new_adobe_reader_and_acrobat_v.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor

Trust: 2.88

sources: NVD: CVE-2009-3955 // CERT/CC: VU#508357 // JVNDB: JVNDB-2010-001016 // BID: 37757 // VULHUB: VHN-41401 // PACKETSTORM: 85088 // PACKETSTORM: 83870

AFFECTED PRODUCTS

vendor:adobemodel:acrobat readerscope:eqversion:4.0.5c

Trust: 1.6

vendor:adobemodel:acrobat readerscope:eqversion:4.0.5a

Trust: 1.6

vendor:adobemodel:acrobat readerscope:eqversion:5.0.10

Trust: 1.6

vendor:adobemodel:acrobat readerscope:eqversion:4.0

Trust: 1.6

vendor:adobemodel:acrobat readerscope:eqversion:3.0

Trust: 1.6

vendor:adobemodel:acrobat readerscope:eqversion:5.0

Trust: 1.6

vendor:adobemodel:acrobat readerscope:eqversion:3.02

Trust: 1.6

vendor:adobemodel:acrobat readerscope:eqversion:4.0.5

Trust: 1.6

vendor:adobemodel:acrobat readerscope:eqversion:4.5

Trust: 1.6

vendor:adobemodel:acrobat readerscope:eqversion:3.01

Trust: 1.6

vendor:adobemodel:acrobatscope:eqversion:9.1.1

Trust: 1.3

vendor:adobemodel:acrobatscope:eqversion:7.0.9

Trust: 1.3

vendor:adobemodel:acrobatscope:eqversion:6.0.1

Trust: 1.3

vendor:adobemodel:acrobatscope:eqversion:7.1.2

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:5.0.10

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:9.1.2

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:7.0.3

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:6.0.3

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:5.0.6

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:4.0.5c

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:3.1

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:7.0.7

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:6.0.2

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:8.1.3

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:5.0.5

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:5.0.7

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.0.1

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:9.1

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.0.9

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:7.0.5

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:7.0

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.1.2

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:8.1.7

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:7.1.1

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:7.1.0

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.0.3

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:6.0.3

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:5.0.9

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:8.1.5

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:5.0.6

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:8.1.1

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.0.7

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:8.0

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:6.0.2

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:5.0.5

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:6.0.4

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:7.0.8

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:9.1

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.0.5

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:7.0.2

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:8.1.7

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:9.1.1

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.1.1

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.1.0

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:8.1.2

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:8.1.5

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:7.1.3

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:8.1.1

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:3.0

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:8.0

Trust: 1.0

vendor:adobemodel:acrobatscope:lteversion:9.2

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:5.0.11

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:8.1.4

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:8.1.6

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:4.0.5a

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:7.0.6

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:7.0.4

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:9.1.3

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:6.0.6

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:6.0.4

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.0.8

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:7.1.4

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:6.0

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.0.2

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:9.0

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:8.1

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:4.0

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:8.1.2

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:6.0.1

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:6.0.5

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.1.3

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:5.1

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:9.1.2

Trust: 1.0

vendor:adobemodel:acrobat readerscope:lteversion:9.2

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:8.1.4

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:8.1.6

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.0.6

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.0.4

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:9.1.3

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:4.0.5

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:6.0

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.0

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:5.0

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:9.0

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:8.1

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:7.0.1

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:6.0.5

Trust: 1.0

vendor:adobemodel: - scope: - version: -

Trust: 0.8

vendor:adobemodel:acrobatscope:ltversion:8.2

Trust: 0.8

vendor:adobemodel:acrobatscope:ltversion:9.3

Trust: 0.8

vendor:adobemodel:readerscope:ltversion:8.2

Trust: 0.8

vendor:adobemodel:readerscope:ltversion:9.3

Trust: 0.8

vendor:red hatmodel:enterprise linux extrasscope:eqversion:3 extras

Trust: 0.8

vendor:red hatmodel:enterprise linux extrasscope:eqversion:4 extras

Trust: 0.8

vendor:red hatmodel:enterprise linux extrasscope:eqversion:4.8.z extras

Trust: 0.8

vendor:red hatmodel:rhel desktop supplementaryscope:eqversion:5 (client)

Trust: 0.8

vendor:red hatmodel:rhel supplementaryscope:eqversion:5 (server)

Trust: 0.8

vendor:red hatmodel:rhel supplementary eusscope:eqversion:5.4.z (server)

Trust: 0.8

vendor:susemodel:linux enterprise desktopscope:eqversion:11

Trust: 0.3

vendor:susemodel:linux enterprise sp3scope:eqversion:10

Trust: 0.3

vendor:susemodel:linux enterprise sp2scope:eqversion:10

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:11.2

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:11.1

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:11.0

Trust: 0.3

vendor:redhatmodel:enterprise linux ws extrasscope:eqversion:4

Trust: 0.3

vendor:redhatmodel:enterprise linux ws extrasscope:eqversion:3

Trust: 0.3

vendor:redhatmodel:enterprise linux extrasscope:eqversion:4

Trust: 0.3

vendor:redhatmodel:enterprise linux extrasscope:eqversion:3

Trust: 0.3

vendor:redhatmodel:enterprise linux es extrasscope:eqversion:4

Trust: 0.3

vendor:redhatmodel:enterprise linux es extrasscope:eqversion:3

Trust: 0.3

vendor:redhatmodel:enterprise linux as extrasscope:eqversion:4

Trust: 0.3

vendor:redhatmodel:enterprise linux as extrasscope:eqversion:3

Trust: 0.3

vendor:redhatmodel:desktop extrasscope:eqversion:4

Trust: 0.3

vendor:redhatmodel:desktop extrasscope:eqversion:3

Trust: 0.3

vendor:redmodel:hat enterprise linux supplementary serverscope:eqversion:5

Trust: 0.3

vendor:redmodel:hat enterprise linux desktop supplementary clientscope:eqversion:5

Trust: 0.3

vendor:nortelmodel:networks self-service speech serverscope:eqversion:0

Trust: 0.3

vendor:nortelmodel:networks self-service peri applicationscope:eqversion:0

Trust: 0.3

vendor:nortelmodel:networks self-service mpsscope:eqversion:5000

Trust: 0.3

vendor:nortelmodel:networks self-service mpsscope:eqversion:10000

Trust: 0.3

vendor:nortelmodel:networks self-service media processing serverscope:eqversion:0

Trust: 0.3

vendor:nortelmodel:networks callpilot 703tscope: - version: -

Trust: 0.3

vendor:nortelmodel:networks callpilot 600rscope: - version: -

Trust: 0.3

vendor:nortelmodel:networks callpilot 201iscope: - version: -

Trust: 0.3

vendor:nortelmodel:networks callpilot 200iscope: - version: -

Trust: 0.3

vendor:nortelmodel:networks callpilot 1005rscope: - version: -

Trust: 0.3

vendor:nortelmodel:networks callpilot 1002rpscope: - version: -

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:9.1.3

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:9.1.2

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:9.1.1

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:8.1.7

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:8.1.6

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:8.1.5

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:8.1.4

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:8.1.3

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:8.1.2

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:8.1.1

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:7.0.9

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:6.0.1

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:9.2

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:9.1

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:9

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:8.1

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:8.0

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:9.1.3

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:9.1.2

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:8.1.7

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:8.1.6

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:8.1.4

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:8.1.3

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:8.1.2

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:8.1.1

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:9.2

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:9.1

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:9

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:8.1

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:8.0

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:9.1.3

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:9.1.2

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:8.1.7

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:8.1.6

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:8.1.4

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:8.1.3

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:8.1.2

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:8.1.1

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:9.2

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:9.1

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:9

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:8.1

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:8.0

Trust: 0.3

vendor:adobemodel:acrobatscope:eqversion:9.2

Trust: 0.3

vendor:adobemodel:readerscope:neversion:9.3

Trust: 0.3

vendor:adobemodel:readerscope:neversion:8.2

Trust: 0.3

vendor:adobemodel:acrobat standardscope:neversion:9.3

Trust: 0.3

vendor:adobemodel:acrobat standardscope:neversion:8.2

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:neversion:9.3

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:neversion:8.2

Trust: 0.3

vendor:adobemodel:acrobatscope:neversion:9.3

Trust: 0.3

sources: CERT/CC: VU#508357 // BID: 37757 // JVNDB: JVNDB-2010-001016 // CNNVD: CNNVD-201001-089 // NVD: CVE-2009-3955

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2009-3955
value: HIGH

Trust: 1.0

CARNEGIE MELLON: VU#508357
value: 65.84

Trust: 0.8

NVD: CVE-2009-3955
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201001-089
value: CRITICAL

Trust: 0.6

VULHUB: VHN-41401
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2009-3955
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-41401
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#508357 // VULHUB: VHN-41401 // JVNDB: JVNDB-2010-001016 // CNNVD: CNNVD-201001-089 // NVD: CVE-2009-3955

PROBLEMTYPE DATA

problemtype:CWE-399

Trust: 1.9

sources: VULHUB: VHN-41401 // JVNDB: JVNDB-2010-001016 // NVD: CVE-2009-3955

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 85088 // CNNVD: CNNVD-201001-089

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201001-089

CONFIGURATIONS

sources: JVNDB: JVNDB-2010-001016

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-41401

PATCH

title:APSB10-02url:http://www.adobe.com/support/security/bulletins/apsb10-02.html

Trust: 0.8

title:APSB10-02url:http://www.adobe.com/jp/support/security/bulletins/apsb10-02.html

Trust: 0.8

title:RHSA-2010:0037url:https://rhn.redhat.com/errata/RHSA-2010-0037.html

Trust: 0.8

title:RHSA-2010:0038url:https://rhn.redhat.com/errata/RHSA-2010-0038.html

Trust: 0.8

title:RHSA-2010:0060url:https://rhn.redhat.com/errata/RHSA-2010-0060.html

Trust: 0.8

title:TA10-013Aurl:http://software.fujitsu.com/jp/security/vulnerabilities/ta10-013a.html

Trust: 0.8

sources: JVNDB: JVNDB-2010-001016

EXTERNAL IDS

db:NVDid:CVE-2009-3955

Trust: 2.9

db:BIDid:37757

Trust: 2.8

db:VUPENid:ADV-2010-0103

Trust: 2.5

db:SECTRACKid:1023446

Trust: 2.5

db:USCERTid:TA10-013A

Trust: 2.5

db:XFid:55553

Trust: 1.4

db:SECUNIAid:38215

Trust: 1.1

db:SECUNIAid:38138

Trust: 1.1

db:SECUNIAid:37690

Trust: 0.9

db:OSVDBid:60980

Trust: 0.8

db:CERT/CCid:VU#508357

Trust: 0.8

db:USCERTid:SA10-013A

Trust: 0.8

db:JVNDBid:JVNDB-2010-001016

Trust: 0.8

db:IDEFENSEid:20100113 ADOBE READER AND ACROBAT JPXDECODE MEMORY CORRUPTION VULNERABILITY

Trust: 0.6

db:CERT/CCid:TA10-013A

Trust: 0.6

db:SUSEid:SUSE-SA:2010:008

Trust: 0.6

db:NSFOCUSid:14341

Trust: 0.6

db:CNNVDid:CNNVD-201001-089

Trust: 0.6

db:PACKETSTORMid:85088

Trust: 0.2

db:VULHUBid:VHN-41401

Trust: 0.1

db:PACKETSTORMid:83870

Trust: 0.1

sources: CERT/CC: VU#508357 // VULHUB: VHN-41401 // BID: 37757 // JVNDB: JVNDB-2010-001016 // PACKETSTORM: 85088 // PACKETSTORM: 83870 // CNNVD: CNNVD-201001-089 // NVD: CVE-2009-3955

REFERENCES

url:http://www.securityfocus.com/bid/37757

Trust: 2.5

url:http://www.us-cert.gov/cas/techalerts/ta10-013a.html

Trust: 2.5

url:http://www.securitytracker.com/id?1023446

Trust: 2.5

url:http://www.vupen.com/english/advisories/2010/0103

Trust: 2.5

url:http://www.adobe.com/support/security/bulletins/apsb10-02.html

Trust: 2.1

url:http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=836

Trust: 2.0

url:http://blogs.adobe.com/psirt/2009/12/new_adobe_reader_and_acrobat_v.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html

Trust: 1.7

url:http://xforce.iss.net/xforce/xfdb/55553

Trust: 1.4

url:https://bugzilla.redhat.com/show_bug.cgi?id=554293

Trust: 1.1

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a8255

Trust: 1.1

url:http://www.redhat.com/support/errata/rhsa-2010-0060.html

Trust: 1.1

url:http://secunia.com/advisories/38138

Trust: 1.1

url:http://secunia.com/advisories/38215

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/55553

Trust: 1.1

url:http://secunia.com/advisories/37690/

Trust: 0.9

url:http://www.adobe.com/support/security/advisories/apsa09-07.html

Trust: 0.8

url:http://kb2.adobe.com/cps/532/cpsid_53237.html

Trust: 0.8

url:http://osvdb.org/show/osvdb/60980

Trust: 0.8

url:http://www.symantec.com/connect/blogs/zero-day-xmas-present

Trust: 0.8

url:http://voices.washingtonpost.com/securityfix/2009/12/hackers_target_unpatched_adobe.html

Trust: 0.8

url:http://vrt-sourcefire.blogspot.com/2009/12/this-is-what-happens-when-you-try-to-do.html

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-3955

Trust: 0.8

url:http://www.ipa.go.jp/security/ciadr/vul/20100113-adobe.html

Trust: 0.8

url:http://www.jpcert.or.jp/at/2010/at100003.txt

Trust: 0.8

url:http://jvn.jp/cert/jvnta10-013a/

Trust: 0.8

url:http://jvn.jp/tr/jvntr-2010-03/

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-3955

Trust: 0.8

url:http://www.us-cert.gov/cas/alerts/sa10-013a.html

Trust: 0.8

url:http://www.npa.go.jp/cyberpolice/index.html#topics

Trust: 0.8

url:http://www.nsfocus.net/vulndb/14341

Trust: 0.6

url:http://www.adobe.com

Trust: 0.3

url:http://support.nortel.com/go/main.jsp?cscat=bltndetail&id=991610

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2009-3955

Trust: 0.1

url:http://cve.mitre.org/),

Trust: 0.1

url:http://www.adobe.com/products/reader/

Trust: 0.1

url:http://labs.idefense.com/intelligence/vulnerabilities/

Trust: 0.1

url:http://www.vulnhunt.com.

Trust: 0.1

url:http://labs.idefense.com/methodology/vulnerability/vcp.php

Trust: 0.1

url:http://labs.idefense.com/

Trust: 0.1

url:http://www.adobe.com/products/acrobat/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/business_solutions/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: CERT/CC: VU#508357 // VULHUB: VHN-41401 // BID: 37757 // JVNDB: JVNDB-2010-001016 // PACKETSTORM: 85088 // PACKETSTORM: 83870 // CNNVD: CNNVD-201001-089 // NVD: CVE-2009-3955

CREDITS

Code Audit Labs※http://www.vulnhunt.com

Trust: 0.6

sources: CNNVD: CNNVD-201001-089

SOURCES

db:CERT/CCid:VU#508357
db:VULHUBid:VHN-41401
db:BIDid:37757
db:JVNDBid:JVNDB-2010-001016
db:PACKETSTORMid:85088
db:PACKETSTORMid:83870
db:CNNVDid:CNNVD-201001-089
db:NVDid:CVE-2009-3955

LAST UPDATE DATE

2024-11-23T21:23:37.698000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#508357date:2010-06-18T00:00:00
db:VULHUBid:VHN-41401date:2018-10-30T00:00:00
db:BIDid:37757date:2015-03-19T09:27:00
db:JVNDBid:JVNDB-2010-001016date:2010-02-10T00:00:00
db:CNNVDid:CNNVD-201001-089date:2011-07-19T00:00:00
db:NVDid:CVE-2009-3955date:2024-11-21T01:08:36.023

SOURCES RELEASE DATE

db:CERT/CCid:VU#508357date:2009-12-15T00:00:00
db:VULHUBid:VHN-41401date:2010-01-13T00:00:00
db:BIDid:37757date:2010-01-12T00:00:00
db:JVNDBid:JVNDB-2010-001016date:2010-02-10T00:00:00
db:PACKETSTORMid:85088date:2010-01-14T02:57:07
db:PACKETSTORMid:83870date:2009-12-15T13:39:57
db:CNNVDid:CNNVD-201001-089date:2010-01-13T00:00:00
db:NVDid:CVE-2009-3955date:2010-01-13T19:30:00.483