ID

VAR-200912-0790


CVE

CVE-2009-3956


TITLE

NOS Microsystems Adobe getPlus Helper ActiveX control stack buffer overflows

Trust: 0.8

sources: CERT/CC: VU#773545

DESCRIPTION

The default configuration of Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, does not enable the Enhanced Security feature, which has unspecified impact and attack vectors, related to a "script injection vulnerability," as demonstrated by Acrobat Forms Data Format (FDF) behavior that allows cross-site scripting (XSS) by user-assisted remote attackers. The Doc.media.newPlayer method in Adobe Acrobat and Reader contains a use-after-free vulnerability, which may allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system. An attacker can exploit this issue to obtain the contents of sensitive PDF files or to perform cross-site scripting attacks against domains hosting PDF files. NOTE: This issue was previously covered in BID 37667 (Adobe Acrobat and Reader January 2010 Multiple Remote Vulnerabilities), but has been given its own record to better document it. ---------------------------------------------------------------------- Do you have VARM strategy implemented? (Vulnerability Assessment Remediation Management) If not, then implement it through the most reliable vulnerability intelligence source on the market. Implement it through Secunia. For more information visit: http://secunia.com/advisories/business_solutions/ Alternatively request a call from a Secunia representative today to discuss how we can help you with our capabilities contact us at: sales@secunia.com ---------------------------------------------------------------------- TITLE: Adobe Reader/Acrobat Code Execution Vulnerability SECUNIA ADVISORY ID: SA37690 VERIFY ADVISORY: http://secunia.com/advisories/37690/ DESCRIPTION: A vulnerability has been reported in Adobe Reader and Acrobat, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to an unspecified error and can be exploited to execute arbitrary code. The vulnerability is reported in versions 9.2 and prior. SOLUTION: Do not open untrusted PDF files. Do not visit untrusted websites or follow untrusted links. PROVIDED AND/OR DISCOVERED BY: Reported as a 0-day. ORIGINAL ADVISORY: http://blogs.adobe.com/psirt/2009/12/new_adobe_reader_and_acrobat_v.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . For more information: SA37690 SOLUTION: Adobe Reader 7.x and Acrobat 7.x: Upgrade to version 8.2 or 9.3. Please see the vendor's advisory for more information. NOTE: Support has ended for Adobe Reader 7.x and Acrobat 7.x on Windows, Macintosh, and UNIX. CHANGELOG: 2010-01-13: Updated CVE references. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 National Cyber Alert System Technical Cyber Security Alert TA10-013A Adobe Reader and Acrobat Vulnerabilities Original release date: Last revised: -- Source: US-CERT Systems Affected * Adobe Reader and Acrobat 9.2 and earlier 9.x versions * Adobe Reader and Acrobat 8.1.7 and earlier 8.x versions Overview Adobe has released Security bulletin APSB10-02, which describes multiple vulnerabilities affecting Adobe Reader and Acrobat. I. These vulnerabilities affect Reader 9.2 and earlier 9.x versions and 8.1.7 and earlier 8.x versions. Further details are available in the US-CERT Vulnerability Notes Database. An attacker could exploit these vulnerabilities by convincing a user to open a specially crafted PDF file. The Adobe Reader browser plug-in is available for multiple web browsers and operating systems, which can automatically open PDF documents hosted on a website. Some of these vulnerabilities are being actively exploited. II. III. Solution Update Adobe has released updates to address this issue. Acrobat JavaScript can be disabled using the Preferences menu (Edit -> Preferences -> JavaScript; un-check Enable Acrobat JavaScript). Prevent Internet Explorer from automatically opening PDF documents The installer for Adobe Reader and Acrobat configures Internet Explorer to automatically open PDF files without any user interaction. This behavior can be reverted to a safer option that prompts the user by importing the following as a .REG file: Windows Registry Editor Version 5.00 [HKEY_CLASSES_ROOT\AcroExch.Document.7] "EditFlags"=hex:00,00,00,00 Disable the display of PDF documents in the web browser Preventing PDF documents from opening inside a web browser will partially mitigate this vulnerability. If this workaround is applied it may also mitigate future vulnerabilities. To prevent PDF documents from automatically being opened in a web browser, do the following: 1. 2. Open the Edit menu. 3. Choose the preferences option. 4. Choose the Internet section. 5. Un-check the "Display PDF in browser" check box. Do not access PDF documents from untrusted sources Do not open unfamiliar or unexpected PDF documents, particularly those hosted on websites or delivered as email attachments. Please see Cyber Security Tip ST04-010. IV. References * Adobe Security Bulletin APSB10-02 - <http://www.adobe.com/support/security/bulletins/apsb10-02.html> * Vulnerability Note VU#508357 - <https://www.kb.cert.org/vuls/id/508357> * Vulnerability Note VU#773545 - <https://www.kb.cert.org/vuls/id/773545> ____________________________________________________________________ The most recent version of this document can be found at: <http://www.us-cert.gov/cas/techalerts/TA10-013A.html> ____________________________________________________________________ Feedback can be directed to US-CERT Technical Staff. Please send email to <cert@cert.org> with "TA10-013A Feedback VU#508357" in the subject. ____________________________________________________________________ For instructions on subscribing to or unsubscribing from this mailing list, visit <http://www.us-cert.gov/cas/signup.html>. ____________________________________________________________________ Produced 2010 by US-CERT, a government organization. Terms of use: <http://www.us-cert.gov/legal.html> ____________________________________________________________________ Revision History January 13, 2010: Initial release -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.5 (GNU/Linux) iQEVAwUBS0402NucaIvSvh1ZAQJ3NQf+IbEop63x4l0P2ns/qPIVL3XaBd6xx11n +8eqQk0+ZtpmrPb03UjWaeh1tkNu98R4sMWZQENOWVbbeYLzAKLHPNf48ewqvzbl UvmW/kLxdu88Ux1BPNpJahX3zZgGqIswYSlGyIhlkpiLhUVrzfssykwyYbGZvGVn so9Euz4/1ZThOgAFoGY8xsqXVZ45lcS6YY2ACkl84r6BBcayzVtIsvfxKDfNMvfP bxjrXNqoLB/9n6x150uo2iF1dtB6uj/V+GVRFZa/X6lySTp/R+InBK8mpsxWMPB4 /la9+twnIB5cPHpNq1WVPhxbElsM3JCAndKEiLLTencMYPLc4i1cLQ== =KC5F -----END PGP SIGNATURE----- . ---------------------------------------------------------------------- Secunia integrated with Microsoft WSUS http://secunia.com/blog/71/ ---------------------------------------------------------------------- TITLE: Red Hat update for acroread SECUNIA ADVISORY ID: SA38215 VERIFY ADVISORY: http://secunia.com/advisories/38215/ DESCRIPTION: Red Hat has issued an update for acroread. This fixes multiple vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks or compromise a user's system. For more information: SA37690 SOLUTION: Updated packages are available via Red Hat Network

Trust: 3.87

sources: NVD: CVE-2009-3956 // CERT/CC: VU#773545 // CERT/CC: VU#508357 // JVNDB: JVNDB-2010-001017 // BID: 37763 // VULHUB: VHN-41402 // PACKETSTORM: 83870 // PACKETSTORM: 85063 // PACKETSTORM: 85057 // PACKETSTORM: 85087 // PACKETSTORM: 85488

AFFECTED PRODUCTS

vendor:adobemodel: - scope: - version: -

Trust: 1.6

vendor:adobemodel:acrobatscope:eqversion:5.0.5

Trust: 1.6

vendor:adobemodel:acrobatscope:eqversion:4.0.5

Trust: 1.6

vendor:adobemodel:acrobatscope:eqversion:6.0.1

Trust: 1.6

vendor:adobemodel:acrobatscope:eqversion:5.0.6

Trust: 1.6

vendor:adobemodel:acrobatscope:eqversion:6.0.4

Trust: 1.6

vendor:adobemodel:acrobatscope:eqversion:4.0.5c

Trust: 1.6

vendor:adobemodel:acrobatscope:eqversion:4.0.5a

Trust: 1.6

vendor:adobemodel:acrobatscope:eqversion:5.0.10

Trust: 1.6

vendor:adobemodel:acrobatscope:eqversion:4.0

Trust: 1.6

vendor:adobemodel:acrobatscope:eqversion:5.0

Trust: 1.6

vendor:adobemodel:acrobatscope:eqversion:9.1.1

Trust: 1.3

vendor:adobemodel:acrobatscope:eqversion:7.1.2

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:9.1.2

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:7.0.3

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:6.0.3

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:3.01

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:4.0.5

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:3.1

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:7.0.7

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:6.0.2

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:8.1.3

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:5.0

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:5.0.7

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.0.1

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:9.1

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.0.9

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:7.0.5

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:7.0

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.1.2

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:8.1.7

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:7.1.1

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:7.1.0

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:5.0.10

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.0.3

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:6.0.3

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:5.0.9

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:3.02

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:8.1.5

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:5.0.6

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:8.1.1

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:4.0.5c

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.0.7

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:8.0

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:6.0.2

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:5.0.5

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:7.0.8

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:9.1

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.0.5

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:7.0.2

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:8.1.7

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:9.1.1

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.1.1

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.1.0

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:8.1.2

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:8.1.5

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:7.1.3

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:8.1.1

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:3.0

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:8.0

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:7.0.9

Trust: 1.0

vendor:adobemodel:acrobatscope:lteversion:9.2

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:5.0.11

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:8.1.4

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:8.1.6

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:7.0.6

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:7.0.4

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:9.1.3

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:6.0.6

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:6.0.4

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.0.8

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:7.1.4

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:6.0

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.0.2

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:9.0

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:8.1

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:8.1.2

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:6.0.1

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:6.0.5

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.1.3

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:5.1

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:3.0

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:9.1.2

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:4.5

Trust: 1.0

vendor:adobemodel:acrobat readerscope:lteversion:9.2

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:8.1.4

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:8.1.6

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:4.0.5a

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.0.6

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.0.4

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:9.1.3

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:6.0

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.0

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:9.0

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:8.1

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:4.0

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:7.0.1

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:6.0.5

Trust: 1.0

vendor:adobemodel:acrobatscope:ltversion:8.2

Trust: 0.8

vendor:adobemodel:acrobatscope:ltversion:9.3

Trust: 0.8

vendor:adobemodel:readerscope:ltversion:8.2

Trust: 0.8

vendor:adobemodel:readerscope:ltversion:9.3

Trust: 0.8

vendor:red hatmodel:enterprise linux extrasscope:eqversion:3 extras

Trust: 0.8

vendor:red hatmodel:enterprise linux extrasscope:eqversion:4 extras

Trust: 0.8

vendor:red hatmodel:enterprise linux extrasscope:eqversion:4.8.z extras

Trust: 0.8

vendor:red hatmodel:rhel desktop supplementaryscope:eqversion:5 (client)

Trust: 0.8

vendor:red hatmodel:rhel supplementaryscope:eqversion:5 (server)

Trust: 0.8

vendor:red hatmodel:rhel supplementary eusscope:eqversion:5.4.z (server)

Trust: 0.8

vendor:adobemodel:acrobat professionalscope:eqversion:8.1.3

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:8.0

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:9.1.2

Trust: 0.3

vendor:susemodel:linux enterprise sp3scope:eqversion:10

Trust: 0.3

vendor:redhatmodel:enterprise linux supplementary serverscope:eqversion:5

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:9.2

Trust: 0.3

vendor:nortelmodel:networks callpilot 1002rpscope: - version: -

Trust: 0.3

vendor:redhatmodel:desktop extrasscope:eqversion:4

Trust: 0.3

vendor:redhatmodel:desktop extrasscope:eqversion:3

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:9.1.3

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:neversion:9.3

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:8.1.6

Trust: 0.3

vendor:redhatmodel:enterprise linux as extrasscope:eqversion:4

Trust: 0.3

vendor:redhatmodel:enterprise linux as extrasscope:eqversion:3

Trust: 0.3

vendor:nortelmodel:networks callpilot 1005rscope: - version: -

Trust: 0.3

vendor:nortelmodel:networks self-service peri applicationscope:eqversion:0

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:8.1.4

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:11.1

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:8.1

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:8.0

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:8.1.2

Trust: 0.3

vendor:adobemodel:acrobat standardscope:neversion:8.2

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:9.1.2

Trust: 0.3

vendor:nortelmodel:networks callpilot 600rscope: - version: -

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:9.1

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:8.1.3

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:8.1.5

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:9

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:8.1.7

Trust: 0.3

vendor:susemodel:linux enterprise sp2scope:eqversion:10

Trust: 0.3

vendor:adobemodel:acrobatscope:neversion:9.3

Trust: 0.3

vendor:adobemodel:acrobat standardscope:neversion:9.3

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:8.1.2

Trust: 0.3

vendor:adobemodel:readerscope:neversion:8.2

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:8.1.4

Trust: 0.3

vendor:nortelmodel:networks self-service speech serverscope:eqversion:0

Trust: 0.3

vendor:nortelmodel:networks callpilot 200iscope: - version: -

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:8.1.3

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:8.1

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:8.1.1

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:11.0

Trust: 0.3

vendor:adobemodel:acrobat professional security updatscope:eqversion:8.1.2

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:9.1

Trust: 0.3

vendor:redhatmodel:enterprise linux extrasscope:eqversion:4

Trust: 0.3

vendor:redhatmodel:enterprise linux extrasscope:eqversion:3

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:9

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop supplementary clientscope:eqversion:5

Trust: 0.3

vendor:adobemodel:reader security updatscope:eqversion:8.1.2

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:8.1.7

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:9.2

Trust: 0.3

vendor:adobemodel:readerscope:neversion:9.3

Trust: 0.3

vendor:nortelmodel:networks self-service mpsscope:eqversion:5000

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:8.1.4

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:9.1.3

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:8.1

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:9.1.1

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:8.1.6

Trust: 0.3

vendor:nortelmodel:networks callpilot 703tscope: - version: -

Trust: 0.3

vendor:susemodel:linux enterprise desktopscope:eqversion:11

Trust: 0.3

vendor:redhatmodel:enterprise linux ws extrasscope:eqversion:4

Trust: 0.3

vendor:redhatmodel:enterprise linux ws extrasscope:eqversion:3

Trust: 0.3

vendor:nortelmodel:networks callpilot 201iscope: - version: -

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:9.1

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:8.1.1

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:8.0

Trust: 0.3

vendor:redhatmodel:enterprise linux es extrasscope:eqversion:4

Trust: 0.3

vendor:redhatmodel:enterprise linux es extrasscope:eqversion:3

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:8.1.7

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:9.1.2

Trust: 0.3

vendor:nortelmodel:networks self-service mpsscope:eqversion:10000

Trust: 0.3

vendor:adobemodel:acrobatscope:eqversion:9.2

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:9.2

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:9.1.3

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:8.1.6

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:11.2

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:8.1.1

Trust: 0.3

vendor:nortelmodel:networks self-service media processing serverscope:eqversion:0

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:8.1.2

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:neversion:8.2

Trust: 0.3

sources: CERT/CC: VU#773545 // CERT/CC: VU#508357 // BID: 37763 // JVNDB: JVNDB-2010-001017 // CNNVD: CNNVD-201001-090 // NVD: CVE-2009-3956

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2009-3956
value: HIGH

Trust: 1.0

CARNEGIE MELLON: VU#773545
value: 3.65

Trust: 0.8

CARNEGIE MELLON: VU#508357
value: 65.84

Trust: 0.8

NVD: CVE-2009-3956
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201001-090
value: CRITICAL

Trust: 0.6

VULHUB: VHN-41402
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2009-3956
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-41402
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#773545 // CERT/CC: VU#508357 // VULHUB: VHN-41402 // JVNDB: JVNDB-2010-001017 // CNNVD: CNNVD-201001-090 // NVD: CVE-2009-3956

PROBLEMTYPE DATA

problemtype:CWE-16

Trust: 1.9

sources: VULHUB: VHN-41402 // JVNDB: JVNDB-2010-001017 // NVD: CVE-2009-3956

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201001-090

TYPE

configuration error

Trust: 0.6

sources: CNNVD: CNNVD-201001-090

CONFIGURATIONS

sources: JVNDB: JVNDB-2010-001017

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-41402

PATCH

title:APSB10-02url:http://www.adobe.com/support/security/bulletins/apsb10-02.html

Trust: 0.8

title:APSB10-02url:http://www.adobe.com/jp/support/security/bulletins/apsb10-02.html

Trust: 0.8

title:RHSA-2010:0037url:https://rhn.redhat.com/errata/RHSA-2010-0037.html

Trust: 0.8

title:RHSA-2010:0038url:https://rhn.redhat.com/errata/RHSA-2010-0038.html

Trust: 0.8

title:RHSA-2010:0060url:https://rhn.redhat.com/errata/RHSA-2010-0060.html

Trust: 0.8

title:TA10-013Aurl:http://software.fujitsu.com/jp/security/vulnerabilities/ta10-013a.html

Trust: 0.8

sources: JVNDB: JVNDB-2010-001017

EXTERNAL IDS

db:NVDid:CVE-2009-3956

Trust: 2.8

db:USCERTid:TA10-013A

Trust: 2.6

db:VUPENid:ADV-2010-0103

Trust: 2.5

db:SECTRACKid:1023446

Trust: 2.5

db:BIDid:37763

Trust: 2.2

db:SECUNIAid:38215

Trust: 1.2

db:SECUNIAid:38138

Trust: 1.2

db:CERT/CCid:VU#773545

Trust: 1.0

db:SECUNIAid:37690

Trust: 0.9

db:CERT/CCid:VU#508357

Trust: 0.9

db:OSVDBid:60980

Trust: 0.8

db:USCERTid:SA10-013A

Trust: 0.8

db:JVNDBid:JVNDB-2010-001017

Trust: 0.8

db:CERT/CCid:TA10-013A

Trust: 0.6

db:SUSEid:SUSE-SA:2010:008

Trust: 0.6

db:NSFOCUSid:14344

Trust: 0.6

db:CNNVDid:CNNVD-201001-090

Trust: 0.6

db:SECUNIAid:38131

Trust: 0.2

db:PACKETSTORMid:85119

Trust: 0.1

db:VULHUBid:VHN-41402

Trust: 0.1

db:PACKETSTORMid:83870

Trust: 0.1

db:PACKETSTORMid:85063

Trust: 0.1

db:PACKETSTORMid:85057

Trust: 0.1

db:PACKETSTORMid:85087

Trust: 0.1

db:PACKETSTORMid:85488

Trust: 0.1

sources: CERT/CC: VU#773545 // CERT/CC: VU#508357 // VULHUB: VHN-41402 // BID: 37763 // JVNDB: JVNDB-2010-001017 // PACKETSTORM: 83870 // PACKETSTORM: 85063 // PACKETSTORM: 85057 // PACKETSTORM: 85087 // PACKETSTORM: 85488 // CNNVD: CNNVD-201001-090 // NVD: CVE-2009-3956

REFERENCES

url:http://www.us-cert.gov/cas/techalerts/ta10-013a.html

Trust: 2.5

url:http://www.securitytracker.com/id?1023446

Trust: 2.5

url:http://www.vupen.com/english/advisories/2010/0103

Trust: 2.5

url:http://www.adobe.com/support/security/bulletins/apsb10-02.html

Trust: 2.2

url:http://www.securityfocus.com/bid/37763

Trust: 1.9

url:http://blogs.adobe.com/psirt/2009/12/new_adobe_reader_and_acrobat_v.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html

Trust: 1.7

url:http://www.stratsec.net/files/ss-2010-001_stratsec_acrobat_script_injection_security_advisory_v1.0.pdf

Trust: 1.4

url:http://secunia.com/advisories/37690/

Trust: 1.1

url:https://bugzilla.redhat.com/show_bug.cgi?id=554296

Trust: 1.1

url:http://www.packetstormsecurity.org/1001-exploits/ss-2010-001.txt

Trust: 1.1

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a8327

Trust: 1.1

url:http://www.redhat.com/support/errata/rhsa-2010-0060.html

Trust: 1.1

url:http://secunia.com/advisories/38138

Trust: 1.1

url:http://secunia.com/advisories/38215

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/55554

Trust: 1.1

url:about vulnerability notes

Trust: 0.8

url:contact us about this vulnerability

Trust: 0.8

url:provide a vendor statement

Trust: 0.8

url:http://www.adobe.com/support/security/advisories/apsa09-07.html

Trust: 0.8

url:http://kb2.adobe.com/cps/532/cpsid_53237.html

Trust: 0.8

url:http://osvdb.org/show/osvdb/60980

Trust: 0.8

url:http://www.symantec.com/connect/blogs/zero-day-xmas-present

Trust: 0.8

url:http://voices.washingtonpost.com/securityfix/2009/12/hackers_target_unpatched_adobe.html

Trust: 0.8

url:http://vrt-sourcefire.blogspot.com/2009/12/this-is-what-happens-when-you-try-to-do.html

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-3956

Trust: 0.8

url:http://www.ipa.go.jp/security/ciadr/vul/20100113-adobe.html

Trust: 0.8

url:http://www.jpcert.or.jp/at/2010/at100003.txt

Trust: 0.8

url:http://jvn.jp/cert/jvnta10-013a/

Trust: 0.8

url:http://jvn.jp/tr/jvntr-2010-03/

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-3956

Trust: 0.8

url:http://www.us-cert.gov/cas/alerts/sa10-013a.html

Trust: 0.8

url:http://www.npa.go.jp/cyberpolice/index.html#topics

Trust: 0.8

url:http://www.nsfocus.net/vulndb/14344

Trust: 0.6

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.4

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.4

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.4

url:http://www.adobe.com

Trust: 0.3

url:http://support.nortel.com/go/main.jsp?cscat=bltndetail&id=991610

Trust: 0.3

url:http://secunia.com/vulnerability_scanning/

Trust: 0.2

url:http://secunia.com/advisories/business_solutions/

Trust: 0.1

url:http://secunia.com/advisories/38138/

Trust: 0.1

url:http://www.kb.cert.org/vuls/id/773545

Trust: 0.1

url:http://secunia.com/advisories/38131/

Trust: 0.1

url:http://www.adobe.com/support/security/bulletins/apsb10-02.html>

Trust: 0.1

url:https://www.kb.cert.org/vuls/id/773545>

Trust: 0.1

url:https://www.kb.cert.org/vuls/id/508357>

Trust: 0.1

url:http://www.us-cert.gov/cas/signup.html>.

Trust: 0.1

url:http://www.us-cert.gov/legal.html>

Trust: 0.1

url:http://www.us-cert.gov/cas/techalerts/ta10-013a.html>

Trust: 0.1

url:https://rhn.redhat.com/errata/rhsa-2010-0060.html

Trust: 0.1

url:http://secunia.com/blog/71/

Trust: 0.1

url:http://rhn.redhat.com

Trust: 0.1

url:http://secunia.com/advisories/38215/

Trust: 0.1

sources: CERT/CC: VU#773545 // CERT/CC: VU#508357 // VULHUB: VHN-41402 // BID: 37763 // JVNDB: JVNDB-2010-001017 // PACKETSTORM: 83870 // PACKETSTORM: 85063 // PACKETSTORM: 85057 // PACKETSTORM: 85087 // PACKETSTORM: 85488 // CNNVD: CNNVD-201001-090 // NVD: CVE-2009-3956

CREDITS

stratsec

Trust: 0.9

sources: BID: 37763 // CNNVD: CNNVD-201001-090

SOURCES

db:CERT/CCid:VU#773545
db:CERT/CCid:VU#508357
db:VULHUBid:VHN-41402
db:BIDid:37763
db:JVNDBid:JVNDB-2010-001017
db:PACKETSTORMid:83870
db:PACKETSTORMid:85063
db:PACKETSTORMid:85057
db:PACKETSTORMid:85087
db:PACKETSTORMid:85488
db:CNNVDid:CNNVD-201001-090
db:NVDid:CVE-2009-3956

LAST UPDATE DATE

2024-11-23T20:06:51.465000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#773545date:2010-01-13T00:00:00
db:CERT/CCid:VU#508357date:2010-06-18T00:00:00
db:VULHUBid:VHN-41402date:2018-10-30T00:00:00
db:BIDid:37763date:2010-02-01T21:21:00
db:JVNDBid:JVNDB-2010-001017date:2010-02-10T00:00:00
db:CNNVDid:CNNVD-201001-090date:2011-07-19T00:00:00
db:NVDid:CVE-2009-3956date:2024-11-21T01:08:36.167

SOURCES RELEASE DATE

db:CERT/CCid:VU#773545date:2010-01-13T00:00:00
db:CERT/CCid:VU#508357date:2009-12-15T00:00:00
db:VULHUBid:VHN-41402date:2010-01-13T00:00:00
db:BIDid:37763date:2010-01-12T00:00:00
db:JVNDBid:JVNDB-2010-001017date:2010-02-10T00:00:00
db:PACKETSTORMid:83870date:2009-12-15T13:39:57
db:PACKETSTORMid:85063date:2010-01-13T17:35:22
db:PACKETSTORMid:85057date:2010-01-13T17:35:06
db:PACKETSTORMid:85087date:2010-01-14T02:46:00
db:PACKETSTORMid:85488date:2010-01-21T10:22:42
db:CNNVDid:CNNVD-201001-090date:2010-01-13T00:00:00
db:NVDid:CVE-2009-3956date:2010-01-13T19:30:00.513