ID

VAR-200912-0765


CVE

CVE-2009-3954


TITLE

NOS Microsystems Adobe getPlus Helper ActiveX control stack buffer overflows

Trust: 0.8

sources: CERT/CC: VU#773545

DESCRIPTION

The 3D implementation in Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, might allow attackers to execute arbitrary code via unspecified vectors, related to a "DLL-loading vulnerability.". An attacker can exploit this issue to execute arbitrary code. Failed exploit attempts will likely cause denial-of-service conditions. This issue affects Reader and Acrobat 9.2 and prior versions. NOTE: This issue was previously covered in BID 37667 (Adobe Acrobat and Reader January 2010 Multiple Remote Vulnerabilities), but has been given its own record to better document it. ---------------------------------------------------------------------- Do you have VARM strategy implemented? (Vulnerability Assessment Remediation Management) If not, then implement it through the most reliable vulnerability intelligence source on the market. Implement it through Secunia. For more information visit: http://secunia.com/advisories/business_solutions/ Alternatively request a call from a Secunia representative today to discuss how we can help you with our capabilities contact us at: sales@secunia.com ---------------------------------------------------------------------- TITLE: Adobe Reader/Acrobat Code Execution Vulnerability SECUNIA ADVISORY ID: SA37690 VERIFY ADVISORY: http://secunia.com/advisories/37690/ DESCRIPTION: A vulnerability has been reported in Adobe Reader and Acrobat, which can be exploited by malicious people to compromise a user's system. SOLUTION: Do not open untrusted PDF files. Do not visit untrusted websites or follow untrusted links. PROVIDED AND/OR DISCOVERED BY: Reported as a 0-day. ORIGINAL ADVISORY: http://blogs.adobe.com/psirt/2009/12/new_adobe_reader_and_acrobat_v.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . For more information: SA37690 SOLUTION: Adobe Reader 7.x and Acrobat 7.x: Upgrade to version 8.2 or 9.3. Please see the vendor's advisory for more information. NOTE: Support has ended for Adobe Reader 7.x and Acrobat 7.x on Windows, Macintosh, and UNIX. CHANGELOG: 2010-01-13: Updated CVE references. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 National Cyber Alert System Technical Cyber Security Alert TA10-013A Adobe Reader and Acrobat Vulnerabilities Original release date: Last revised: -- Source: US-CERT Systems Affected * Adobe Reader and Acrobat 9.2 and earlier 9.x versions * Adobe Reader and Acrobat 8.1.7 and earlier 8.x versions Overview Adobe has released Security bulletin APSB10-02, which describes multiple vulnerabilities affecting Adobe Reader and Acrobat. I. Further details are available in the US-CERT Vulnerability Notes Database. An attacker could exploit these vulnerabilities by convincing a user to open a specially crafted PDF file. The Adobe Reader browser plug-in is available for multiple web browsers and operating systems, which can automatically open PDF documents hosted on a website. Some of these vulnerabilities are being actively exploited. II. III. Solution Update Adobe has released updates to address this issue. Acrobat JavaScript can be disabled using the Preferences menu (Edit -> Preferences -> JavaScript; un-check Enable Acrobat JavaScript). Prevent Internet Explorer from automatically opening PDF documents The installer for Adobe Reader and Acrobat configures Internet Explorer to automatically open PDF files without any user interaction. This behavior can be reverted to a safer option that prompts the user by importing the following as a .REG file: Windows Registry Editor Version 5.00 [HKEY_CLASSES_ROOT\AcroExch.Document.7] "EditFlags"=hex:00,00,00,00 Disable the display of PDF documents in the web browser Preventing PDF documents from opening inside a web browser will partially mitigate this vulnerability. If this workaround is applied it may also mitigate future vulnerabilities. To prevent PDF documents from automatically being opened in a web browser, do the following: 1. 2. Open the Edit menu. 3. Choose the preferences option. 4. Choose the Internet section. 5. Un-check the "Display PDF in browser" check box. Do not access PDF documents from untrusted sources Do not open unfamiliar or unexpected PDF documents, particularly those hosted on websites or delivered as email attachments. Please see Cyber Security Tip ST04-010. IV. References * Adobe Security Bulletin APSB10-02 - <http://www.adobe.com/support/security/bulletins/apsb10-02.html> * Vulnerability Note VU#508357 - <https://www.kb.cert.org/vuls/id/508357> * Vulnerability Note VU#773545 - <https://www.kb.cert.org/vuls/id/773545> ____________________________________________________________________ The most recent version of this document can be found at: <http://www.us-cert.gov/cas/techalerts/TA10-013A.html> ____________________________________________________________________ Feedback can be directed to US-CERT Technical Staff. Please send email to <cert@cert.org> with "TA10-013A Feedback VU#508357" in the subject. ____________________________________________________________________ For instructions on subscribing to or unsubscribing from this mailing list, visit <http://www.us-cert.gov/cas/signup.html>. ____________________________________________________________________ Produced 2010 by US-CERT, a government organization. Terms of use: <http://www.us-cert.gov/legal.html> ____________________________________________________________________ Revision History January 13, 2010: Initial release -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.5 (GNU/Linux) iQEVAwUBS0402NucaIvSvh1ZAQJ3NQf+IbEop63x4l0P2ns/qPIVL3XaBd6xx11n +8eqQk0+ZtpmrPb03UjWaeh1tkNu98R4sMWZQENOWVbbeYLzAKLHPNf48ewqvzbl UvmW/kLxdu88Ux1BPNpJahX3zZgGqIswYSlGyIhlkpiLhUVrzfssykwyYbGZvGVn so9Euz4/1ZThOgAFoGY8xsqXVZ45lcS6YY2ACkl84r6BBcayzVtIsvfxKDfNMvfP bxjrXNqoLB/9n6x150uo2iF1dtB6uj/V+GVRFZa/X6lySTp/R+InBK8mpsxWMPB4 /la9+twnIB5cPHpNq1WVPhxbElsM3JCAndKEiLLTencMYPLc4i1cLQ== =KC5F -----END PGP SIGNATURE----- . ---------------------------------------------------------------------- Secunia integrated with Microsoft WSUS http://secunia.com/blog/71/ ---------------------------------------------------------------------- TITLE: Red Hat update for acroread SECUNIA ADVISORY ID: SA38215 VERIFY ADVISORY: http://secunia.com/advisories/38215/ DESCRIPTION: Red Hat has issued an update for acroread. This fixes multiple vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks or compromise a user's system. For more information: SA37690 SOLUTION: Updated packages are available via Red Hat Network

Trust: 3.87

sources: NVD: CVE-2009-3954 // CERT/CC: VU#773545 // CERT/CC: VU#508357 // JVNDB: JVNDB-2010-001015 // BID: 37761 // VULHUB: VHN-41400 // PACKETSTORM: 83870 // PACKETSTORM: 85063 // PACKETSTORM: 85057 // PACKETSTORM: 85087 // PACKETSTORM: 85488

AFFECTED PRODUCTS

vendor:adobemodel:acrobatscope:eqversion:9.1.1

Trust: 1.9

vendor:adobemodel: - scope: - version: -

Trust: 1.6

vendor:adobemodel:acrobatscope:eqversion:8.1.4

Trust: 1.6

vendor:adobemodel:acrobatscope:eqversion:9.1

Trust: 1.6

vendor:adobemodel:acrobatscope:eqversion:9.1.2

Trust: 1.6

vendor:adobemodel:acrobatscope:eqversion:8.1.7

Trust: 1.6

vendor:adobemodel:acrobatscope:eqversion:8.1.6

Trust: 1.6

vendor:adobemodel:acrobatscope:eqversion:8.1.5

Trust: 1.6

vendor:adobemodel:acrobatscope:eqversion:9.0

Trust: 1.6

vendor:adobemodel:acrobatscope:eqversion:9.1.3

Trust: 1.6

vendor:adobemodel:acrobatscope:eqversion:6.0.1

Trust: 1.3

vendor:adobemodel:acrobatscope:eqversion:7.0.9

Trust: 1.3

vendor:adobemodel:acrobatscope:eqversion:7.1.2

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:5.0.10

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:9.1.2

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:7.0.3

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:6.0.3

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:5.0.6

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:3.01

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:4.0.5

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:4.0.5c

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:3.1

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:7.0.7

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:6.0.2

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:8.1.3

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:5.0.5

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:5.0

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:5.0.7

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.0.1

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.0.9

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:7.0.5

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:7.0

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.1.2

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:7.1.1

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:7.1.0

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:5.0.10

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.0.3

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:6.0.3

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:5.0.9

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:3.02

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:5.0.6

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:8.1.1

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:4.0.5c

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.0.7

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:8.0

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:6.0.2

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:5.0.5

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:6.0.4

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:7.0.8

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:9.1

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.0.5

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:7.0.2

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:8.1.7

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:9.1.1

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.1.1

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.1.0

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:8.1.2

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:8.1.5

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:7.1.3

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:8.1.1

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:3.0

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:8.0

Trust: 1.0

vendor:adobemodel:acrobatscope:lteversion:9.2

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:5.0.11

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:4.0.5a

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:7.0.6

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:7.0.4

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:6.0.6

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:6.0.4

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.0.8

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:7.1.4

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:6.0

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.0.2

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:8.1

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:4.0

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:8.1.2

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:6.0.1

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:6.0.5

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.1.3

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:5.1

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:3.0

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:4.5

Trust: 1.0

vendor:adobemodel:acrobat readerscope:lteversion:9.2

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:8.1.4

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:8.1.6

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:4.0.5a

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.0.6

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.0.4

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:9.1.3

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:4.0.5

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:6.0

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.0

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:5.0

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:9.0

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:8.1

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:4.0

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:7.0.1

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:6.0.5

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:9.2

Trust: 0.9

vendor:adobemodel:acrobatscope:ltversion:8.2

Trust: 0.8

vendor:adobemodel:acrobatscope:ltversion:9.3

Trust: 0.8

vendor:adobemodel:readerscope:ltversion:8.2

Trust: 0.8

vendor:adobemodel:readerscope:ltversion:9.3

Trust: 0.8

vendor:red hatmodel:enterprise linux extrasscope:eqversion:3 extras

Trust: 0.8

vendor:red hatmodel:enterprise linux extrasscope:eqversion:4 extras

Trust: 0.8

vendor:red hatmodel:enterprise linux extrasscope:eqversion:4.8.z extras

Trust: 0.8

vendor:red hatmodel:rhel desktop supplementaryscope:eqversion:5 (client)

Trust: 0.8

vendor:red hatmodel:rhel supplementaryscope:eqversion:5 (server)

Trust: 0.8

vendor:red hatmodel:rhel supplementary eusscope:eqversion:5.4.z (server)

Trust: 0.8

vendor:adobemodel:acrobat professionalscope:eqversion:8.1.3

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:8.0

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:9.1.2

Trust: 0.3

vendor:susemodel:linux enterprise sp3scope:eqversion:10

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:9.2

Trust: 0.3

vendor:nortelmodel:networks callpilot 1002rpscope: - version: -

Trust: 0.3

vendor:redhatmodel:enterprise linux ws extrasscope:eqversion:3

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:9.1.3

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:neversion:9.3

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:8.1.6

Trust: 0.3

vendor:nortelmodel:networks callpilot 1005rscope: - version: -

Trust: 0.3

vendor:nortelmodel:networks self-service peri applicationscope:eqversion:0

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:8.1.4

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:11.1

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:8.1

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:8.0

Trust: 0.3

vendor:redhatmodel:desktop extrasscope:eqversion:4

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:8.1.2

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:9.1.2

Trust: 0.3

vendor:adobemodel:acrobat standardscope:neversion:8.2

Trust: 0.3

vendor:nortelmodel:networks callpilot 600rscope: - version: -

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:9.1

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:8.1.3

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:8.1.5

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:9

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:8.1.7

Trust: 0.3

vendor:redmodel:hat enterprise linux supplementary serverscope:eqversion:5

Trust: 0.3

vendor:redhatmodel:enterprise linux extrasscope:eqversion:4

Trust: 0.3

vendor:redhatmodel:enterprise linux extrasscope:eqversion:3

Trust: 0.3

vendor:susemodel:linux enterprise sp2scope:eqversion:10

Trust: 0.3

vendor:adobemodel:acrobatscope:neversion:9.3

Trust: 0.3

vendor:adobemodel:acrobat standardscope:neversion:9.3

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:8.1.2

Trust: 0.3

vendor:adobemodel:readerscope:neversion:8.2

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:8.1.4

Trust: 0.3

vendor:nortelmodel:networks self-service speech serverscope:eqversion:0

Trust: 0.3

vendor:nortelmodel:networks callpilot 200iscope: - version: -

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:8.1.3

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:8.1

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:8.1.1

Trust: 0.3

vendor:redhatmodel:desktop extrasscope:eqversion:3

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:11.0

Trust: 0.3

vendor:susemodel:linux enterprise desktopscope:eqversion:11

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:9.1

Trust: 0.3

vendor:redhatmodel:enterprise linux es extrasscope:eqversion:4

Trust: 0.3

vendor:redhatmodel:enterprise linux es extrasscope:eqversion:3

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:9

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:8.1.7

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:9.2

Trust: 0.3

vendor:adobemodel:readerscope:neversion:9.3

Trust: 0.3

vendor:nortelmodel:networks self-service mpsscope:eqversion:5000

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:8.1.4

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:9.1.3

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:8.1

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:9.1.1

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:8.1.6

Trust: 0.3

vendor:nortelmodel:networks callpilot 703tscope: - version: -

Trust: 0.3

vendor:nortelmodel:networks callpilot 201iscope: - version: -

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:9.1

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:8.1.1

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:9

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:8.0

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:8.1.7

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:9.1.2

Trust: 0.3

vendor:redmodel:hat enterprise linux desktop supplementary clientscope:eqversion:5

Trust: 0.3

vendor:nortelmodel:networks self-service mpsscope:eqversion:10000

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:9.2

Trust: 0.3

vendor:redhatmodel:enterprise linux ws extrasscope:eqversion:4

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:9.1.3

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:8.1.6

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:11.2

Trust: 0.3

vendor:redhatmodel:enterprise linux as extrasscope:eqversion:4

Trust: 0.3

vendor:redhatmodel:enterprise linux as extrasscope:eqversion:3

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:8.1.1

Trust: 0.3

vendor:nortelmodel:networks self-service media processing serverscope:eqversion:0

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:8.1.2

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:6.0.1

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:neversion:8.2

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:7.0.9

Trust: 0.3

sources: CERT/CC: VU#773545 // CERT/CC: VU#508357 // BID: 37761 // JVNDB: JVNDB-2010-001015 // CNNVD: CNNVD-201001-088 // NVD: CVE-2009-3954

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2009-3954
value: HIGH

Trust: 1.0

CARNEGIE MELLON: VU#773545
value: 3.65

Trust: 0.8

CARNEGIE MELLON: VU#508357
value: 65.84

Trust: 0.8

NVD: CVE-2009-3954
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201001-088
value: CRITICAL

Trust: 0.6

VULHUB: VHN-41400
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2009-3954
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-41400
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#773545 // CERT/CC: VU#508357 // VULHUB: VHN-41400 // JVNDB: JVNDB-2010-001015 // CNNVD: CNNVD-201001-088 // NVD: CVE-2009-3954

PROBLEMTYPE DATA

problemtype:CWE-94

Trust: 1.9

sources: VULHUB: VHN-41400 // JVNDB: JVNDB-2010-001015 // NVD: CVE-2009-3954

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201001-088

TYPE

code injection

Trust: 0.6

sources: CNNVD: CNNVD-201001-088

CONFIGURATIONS

sources: JVNDB: JVNDB-2010-001015

PATCH

title:APSB10-02url:http://www.adobe.com/support/security/bulletins/apsb10-02.html

Trust: 0.8

title:APSB10-02url:http://www.adobe.com/jp/support/security/bulletins/apsb10-02.html

Trust: 0.8

title:RHSA-2010:0037url:https://rhn.redhat.com/errata/RHSA-2010-0037.html

Trust: 0.8

title:RHSA-2010:0038url:https://rhn.redhat.com/errata/RHSA-2010-0038.html

Trust: 0.8

title:RHSA-2010:0060url:https://rhn.redhat.com/errata/RHSA-2010-0060.html

Trust: 0.8

title:TA10-013Aurl:http://software.fujitsu.com/jp/security/vulnerabilities/ta10-013a.html

Trust: 0.8

sources: JVNDB: JVNDB-2010-001015

EXTERNAL IDS

db:NVDid:CVE-2009-3954

Trust: 2.8

db:USCERTid:TA10-013A

Trust: 2.6

db:VUPENid:ADV-2010-0103

Trust: 2.5

db:SECTRACKid:1023446

Trust: 2.5

db:BIDid:37761

Trust: 2.2

db:SECUNIAid:38215

Trust: 1.2

db:SECUNIAid:38138

Trust: 1.2

db:CERT/CCid:VU#773545

Trust: 1.0

db:SECUNIAid:37690

Trust: 0.9

db:CERT/CCid:VU#508357

Trust: 0.9

db:OSVDBid:60980

Trust: 0.8

db:USCERTid:SA10-013A

Trust: 0.8

db:JVNDBid:JVNDB-2010-001015

Trust: 0.8

db:CNNVDid:CNNVD-201001-088

Trust: 0.7

db:CERT/CCid:TA10-013A

Trust: 0.6

db:SUSEid:SUSE-SA:2010:008

Trust: 0.6

db:NSFOCUSid:14343

Trust: 0.6

db:SECUNIAid:38131

Trust: 0.2

db:VULHUBid:VHN-41400

Trust: 0.1

db:PACKETSTORMid:83870

Trust: 0.1

db:PACKETSTORMid:85063

Trust: 0.1

db:PACKETSTORMid:85057

Trust: 0.1

db:PACKETSTORMid:85087

Trust: 0.1

db:PACKETSTORMid:85488

Trust: 0.1

sources: CERT/CC: VU#773545 // CERT/CC: VU#508357 // VULHUB: VHN-41400 // BID: 37761 // JVNDB: JVNDB-2010-001015 // PACKETSTORM: 83870 // PACKETSTORM: 85063 // PACKETSTORM: 85057 // PACKETSTORM: 85087 // PACKETSTORM: 85488 // CNNVD: CNNVD-201001-088 // NVD: CVE-2009-3954

REFERENCES

url:http://www.us-cert.gov/cas/techalerts/ta10-013a.html

Trust: 2.5

url:http://www.securitytracker.com/id?1023446

Trust: 2.5

url:http://www.vupen.com/english/advisories/2010/0103

Trust: 2.5

url:http://www.adobe.com/support/security/bulletins/apsb10-02.html

Trust: 2.2

url:http://www.securityfocus.com/bid/37761

Trust: 1.9

url:http://blogs.adobe.com/psirt/2009/12/new_adobe_reader_and_acrobat_v.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html

Trust: 1.7

url:http://secunia.com/advisories/37690/

Trust: 1.1

url:https://bugzilla.redhat.com/show_bug.cgi?id=554293

Trust: 1.1

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a8528

Trust: 1.1

url:http://www.redhat.com/support/errata/rhsa-2010-0060.html

Trust: 1.1

url:http://secunia.com/advisories/38138

Trust: 1.1

url:http://secunia.com/advisories/38215

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/55552

Trust: 1.1

url:about vulnerability notes

Trust: 0.8

url:contact us about this vulnerability

Trust: 0.8

url:provide a vendor statement

Trust: 0.8

url:http://www.adobe.com/support/security/advisories/apsa09-07.html

Trust: 0.8

url:http://kb2.adobe.com/cps/532/cpsid_53237.html

Trust: 0.8

url:http://osvdb.org/show/osvdb/60980

Trust: 0.8

url:http://www.symantec.com/connect/blogs/zero-day-xmas-present

Trust: 0.8

url:http://voices.washingtonpost.com/securityfix/2009/12/hackers_target_unpatched_adobe.html

Trust: 0.8

url:http://vrt-sourcefire.blogspot.com/2009/12/this-is-what-happens-when-you-try-to-do.html

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-3954

Trust: 0.8

url:http://www.ipa.go.jp/security/ciadr/vul/20100113-adobe.html

Trust: 0.8

url:http://www.jpcert.or.jp/at/2010/at100003.txt

Trust: 0.8

url:http://jvn.jp/cert/jvnta10-013a/

Trust: 0.8

url:http://jvn.jp/tr/jvntr-2010-03/

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-3954

Trust: 0.8

url:http://www.us-cert.gov/cas/alerts/sa10-013a.html

Trust: 0.8

url:http://www.npa.go.jp/cyberpolice/index.html#topics

Trust: 0.8

url:http://www.nsfocus.net/vulndb/14343

Trust: 0.6

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.4

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.4

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.4

url:http://www.adobe.com

Trust: 0.3

url:http://support.nortel.com/go/main.jsp?cscat=bltndetail&id=991610

Trust: 0.3

url:http://secunia.com/vulnerability_scanning/

Trust: 0.2

url:http://secunia.com/advisories/business_solutions/

Trust: 0.1

url:http://secunia.com/advisories/38138/

Trust: 0.1

url:http://www.kb.cert.org/vuls/id/773545

Trust: 0.1

url:http://secunia.com/advisories/38131/

Trust: 0.1

url:http://www.adobe.com/support/security/bulletins/apsb10-02.html>

Trust: 0.1

url:https://www.kb.cert.org/vuls/id/773545>

Trust: 0.1

url:https://www.kb.cert.org/vuls/id/508357>

Trust: 0.1

url:http://www.us-cert.gov/cas/signup.html>.

Trust: 0.1

url:http://www.us-cert.gov/legal.html>

Trust: 0.1

url:http://www.us-cert.gov/cas/techalerts/ta10-013a.html>

Trust: 0.1

url:https://rhn.redhat.com/errata/rhsa-2010-0060.html

Trust: 0.1

url:http://secunia.com/blog/71/

Trust: 0.1

url:http://rhn.redhat.com

Trust: 0.1

url:http://secunia.com/advisories/38215/

Trust: 0.1

sources: CERT/CC: VU#773545 // CERT/CC: VU#508357 // VULHUB: VHN-41400 // BID: 37761 // JVNDB: JVNDB-2010-001015 // PACKETSTORM: 83870 // PACKETSTORM: 85063 // PACKETSTORM: 85057 // PACKETSTORM: 85087 // PACKETSTORM: 85488 // CNNVD: CNNVD-201001-088 // NVD: CVE-2009-3954

CREDITS

Greg MacManus

Trust: 0.9

sources: BID: 37761 // CNNVD: CNNVD-201001-088

SOURCES

db:CERT/CCid:VU#773545
db:CERT/CCid:VU#508357
db:VULHUBid:VHN-41400
db:BIDid:37761
db:JVNDBid:JVNDB-2010-001015
db:PACKETSTORMid:83870
db:PACKETSTORMid:85063
db:PACKETSTORMid:85057
db:PACKETSTORMid:85087
db:PACKETSTORMid:85488
db:CNNVDid:CNNVD-201001-088
db:NVDid:CVE-2009-3954

LAST UPDATE DATE

2024-11-23T20:33:55.403000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#773545date:2010-01-13T00:00:00
db:CERT/CCid:VU#508357date:2010-06-18T00:00:00
db:VULHUBid:VHN-41400date:2018-10-30T00:00:00
db:BIDid:37761date:2010-02-01T21:21:00
db:JVNDBid:JVNDB-2010-001015date:2010-02-10T00:00:00
db:CNNVDid:CNNVD-201001-088date:2010-01-13T00:00:00
db:NVDid:CVE-2009-3954date:2024-11-21T01:08:35.870

SOURCES RELEASE DATE

db:CERT/CCid:VU#773545date:2010-01-13T00:00:00
db:CERT/CCid:VU#508357date:2009-12-15T00:00:00
db:VULHUBid:VHN-41400date:2010-01-13T00:00:00
db:BIDid:37761date:2010-01-12T00:00:00
db:JVNDBid:JVNDB-2010-001015date:2010-02-10T00:00:00
db:PACKETSTORMid:83870date:2009-12-15T13:39:57
db:PACKETSTORMid:85063date:2010-01-13T17:35:22
db:PACKETSTORMid:85057date:2010-01-13T17:35:06
db:PACKETSTORMid:85087date:2010-01-14T02:46:00
db:PACKETSTORMid:85488date:2010-01-21T10:22:42
db:CNNVDid:CNNVD-201001-088date:2010-01-13T00:00:00
db:NVDid:CVE-2009-3954date:2010-01-13T19:30:00.407