ID

VAR-201001-0021


CVE

CVE-2009-3957


TITLE

NOS Microsystems Adobe getPlus Helper ActiveX control stack buffer overflows

Trust: 0.8

sources: CERT/CC: VU#773545

DESCRIPTION

Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, might allow attackers to cause a denial of service (NULL pointer dereference) via unspecified vectors. The Doc.media.newPlayer method in Adobe Acrobat and Reader contains a use-after-free vulnerability, which may allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system. Adobe Reader and Acrobat are prone to a denial-of-service vulnerability. Successfully exploiting this issue may allow attackers to crash the affected applications, denying service to legitimate users. NOTE: This issue was previously covered in BID 37667 (Adobe Acrobat and Reader January 2010 Multiple Remote Vulnerabilities), but has been given its own record to better document it. ---------------------------------------------------------------------- Do you have VARM strategy implemented? (Vulnerability Assessment Remediation Management) If not, then implement it through the most reliable vulnerability intelligence source on the market. Implement it through Secunia. For more information visit: http://secunia.com/advisories/business_solutions/ Alternatively request a call from a Secunia representative today to discuss how we can help you with our capabilities contact us at: sales@secunia.com ---------------------------------------------------------------------- TITLE: Adobe Reader/Acrobat Code Execution Vulnerability SECUNIA ADVISORY ID: SA37690 VERIFY ADVISORY: http://secunia.com/advisories/37690/ DESCRIPTION: A vulnerability has been reported in Adobe Reader and Acrobat, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to an unspecified error and can be exploited to execute arbitrary code. The vulnerability is reported in versions 9.2 and prior. SOLUTION: Do not open untrusted PDF files. Do not visit untrusted websites or follow untrusted links. PROVIDED AND/OR DISCOVERED BY: Reported as a 0-day. ORIGINAL ADVISORY: http://blogs.adobe.com/psirt/2009/12/new_adobe_reader_and_acrobat_v.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 National Cyber Alert System Technical Cyber Security Alert TA10-013A Adobe Reader and Acrobat Vulnerabilities Original release date: Last revised: -- Source: US-CERT Systems Affected * Adobe Reader and Acrobat 9.2 and earlier 9.x versions * Adobe Reader and Acrobat 8.1.7 and earlier 8.x versions Overview Adobe has released Security bulletin APSB10-02, which describes multiple vulnerabilities affecting Adobe Reader and Acrobat. I. These vulnerabilities affect Reader 9.2 and earlier 9.x versions and 8.1.7 and earlier 8.x versions. Further details are available in the US-CERT Vulnerability Notes Database. An attacker could exploit these vulnerabilities by convincing a user to open a specially crafted PDF file. The Adobe Reader browser plug-in is available for multiple web browsers and operating systems, which can automatically open PDF documents hosted on a website. Some of these vulnerabilities are being actively exploited. II. III. Solution Update Adobe has released updates to address this issue. Acrobat JavaScript can be disabled using the Preferences menu (Edit -> Preferences -> JavaScript; un-check Enable Acrobat JavaScript). Prevent Internet Explorer from automatically opening PDF documents The installer for Adobe Reader and Acrobat configures Internet Explorer to automatically open PDF files without any user interaction. This behavior can be reverted to a safer option that prompts the user by importing the following as a .REG file: Windows Registry Editor Version 5.00 [HKEY_CLASSES_ROOT\AcroExch.Document.7] "EditFlags"=hex:00,00,00,00 Disable the display of PDF documents in the web browser Preventing PDF documents from opening inside a web browser will partially mitigate this vulnerability. If this workaround is applied it may also mitigate future vulnerabilities. To prevent PDF documents from automatically being opened in a web browser, do the following: 1. 2. Open the Edit menu. 3. Choose the preferences option. 4. Choose the Internet section. 5. Un-check the "Display PDF in browser" check box. Do not access PDF documents from untrusted sources Do not open unfamiliar or unexpected PDF documents, particularly those hosted on websites or delivered as email attachments. Please see Cyber Security Tip ST04-010. IV. References * Adobe Security Bulletin APSB10-02 - <http://www.adobe.com/support/security/bulletins/apsb10-02.html> * Vulnerability Note VU#508357 - <https://www.kb.cert.org/vuls/id/508357> * Vulnerability Note VU#773545 - <https://www.kb.cert.org/vuls/id/773545> ____________________________________________________________________ The most recent version of this document can be found at: <http://www.us-cert.gov/cas/techalerts/TA10-013A.html> ____________________________________________________________________ Feedback can be directed to US-CERT Technical Staff. Please send email to <cert@cert.org> with "TA10-013A Feedback VU#508357" in the subject. ____________________________________________________________________ For instructions on subscribing to or unsubscribing from this mailing list, visit <http://www.us-cert.gov/cas/signup.html>. ____________________________________________________________________ Produced 2010 by US-CERT, a government organization. Terms of use: <http://www.us-cert.gov/legal.html> ____________________________________________________________________ Revision History January 13, 2010: Initial release -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.5 (GNU/Linux) iQEVAwUBS0402NucaIvSvh1ZAQJ3NQf+IbEop63x4l0P2ns/qPIVL3XaBd6xx11n +8eqQk0+ZtpmrPb03UjWaeh1tkNu98R4sMWZQENOWVbbeYLzAKLHPNf48ewqvzbl UvmW/kLxdu88Ux1BPNpJahX3zZgGqIswYSlGyIhlkpiLhUVrzfssykwyYbGZvGVn so9Euz4/1ZThOgAFoGY8xsqXVZ45lcS6YY2ACkl84r6BBcayzVtIsvfxKDfNMvfP bxjrXNqoLB/9n6x150uo2iF1dtB6uj/V+GVRFZa/X6lySTp/R+InBK8mpsxWMPB4 /la9+twnIB5cPHpNq1WVPhxbElsM3JCAndKEiLLTencMYPLc4i1cLQ== =KC5F -----END PGP SIGNATURE-----

Trust: 3.69

sources: NVD: CVE-2009-3957 // CERT/CC: VU#773545 // CERT/CC: VU#508357 // JVNDB: JVNDB-2010-001018 // BID: 37760 // VULHUB: VHN-41403 // PACKETSTORM: 83870 // PACKETSTORM: 85057 // PACKETSTORM: 85087

AFFECTED PRODUCTS

vendor:adobemodel: - scope: - version: -

Trust: 1.6

vendor:adobemodel:acrobat readerscope:eqversion:4.0.5c

Trust: 1.6

vendor:adobemodel:acrobat readerscope:eqversion:4.0.5a

Trust: 1.6

vendor:adobemodel:acrobat readerscope:eqversion:5.0.10

Trust: 1.6

vendor:adobemodel:acrobat readerscope:eqversion:4.0

Trust: 1.6

vendor:adobemodel:acrobat readerscope:eqversion:3.0

Trust: 1.6

vendor:adobemodel:acrobat readerscope:eqversion:5.0

Trust: 1.6

vendor:adobemodel:acrobat readerscope:eqversion:3.02

Trust: 1.6

vendor:adobemodel:acrobat readerscope:eqversion:4.0.5

Trust: 1.6

vendor:adobemodel:acrobat readerscope:eqversion:4.5

Trust: 1.6

vendor:adobemodel:acrobat readerscope:eqversion:3.01

Trust: 1.6

vendor:adobemodel:acrobatscope:eqversion:9.1.1

Trust: 1.3

vendor:adobemodel:acrobatscope:eqversion:7.1.2

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:5.0.10

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:9.1.2

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:7.0.3

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:6.0.3

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:5.0.6

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:4.0.5c

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:3.1

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:7.0.7

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:6.0.2

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:8.1.3

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:5.0.5

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:5.0.7

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.0.1

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:9.1

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.0.9

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:7.0.5

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:7.0

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.1.2

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:8.1.7

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:7.1.1

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:7.1.0

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.0.3

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:6.0.3

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:5.0.9

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:8.1.5

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:5.0.6

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:8.1.1

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.0.7

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:8.0

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:6.0.2

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:5.0.5

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:6.0.4

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:7.0.8

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:9.1

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.0.5

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:7.0.2

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:8.1.7

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:9.1.1

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.1.1

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.1.0

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:8.1.2

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:6.0.1

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:8.1.5

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:7.1.3

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:8.1.1

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:3.0

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:8.0

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:7.0.9

Trust: 1.0

vendor:adobemodel:acrobatscope:lteversion:9.2

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:5.0.11

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:8.1.4

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:8.1.6

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:4.0.5a

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:7.0.6

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:7.0.4

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:9.1.3

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:6.0.6

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:6.0.4

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.0.8

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:7.1.4

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:6.0

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.0.2

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:9.0

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:8.1

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:4.0

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:8.1.2

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:6.0.1

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:6.0.5

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.1.3

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:5.1

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:9.1.2

Trust: 1.0

vendor:adobemodel:acrobat readerscope:lteversion:9.2

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:8.1.4

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:8.1.6

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.0.6

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.0.4

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:9.1.3

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:4.0.5

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:6.0

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.0

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:5.0

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:9.0

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:8.1

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:7.0.1

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:6.0.5

Trust: 1.0

vendor:adobemodel:acrobatscope:ltversion:8.2

Trust: 0.8

vendor:adobemodel:acrobatscope:ltversion:9.3

Trust: 0.8

vendor:adobemodel:readerscope:ltversion:8.2

Trust: 0.8

vendor:adobemodel:readerscope:ltversion:9.3

Trust: 0.8

vendor:adobemodel:acrobat standardscope:neversion:8.2

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:11.0

Trust: 0.3

vendor:nortelmodel:networks callpilot 600rscope: - version: -

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:8.1.3

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:9.1

Trust: 0.3

vendor:adobemodel:acrobat professional security updatscope:eqversion:8.1.2

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:8.0

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:8.1.3

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:8.0

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:8.1.7

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:9.1

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:9.1.2

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:8.1.5

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:9

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:9.1.2

Trust: 0.3

vendor:susemodel:linux enterprise sp3scope:eqversion:10

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:9.2

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:8.1.7

Trust: 0.3

vendor:adobemodel:reader security updatscope:eqversion:8.1.2

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:8.1.7

Trust: 0.3

vendor:nortelmodel:networks callpilot 1002rpscope: - version: -

Trust: 0.3

vendor:susemodel:linux enterprise sp2scope:eqversion:10

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:9.2

Trust: 0.3

vendor:nortelmodel:networks self-service mpsscope:eqversion:10000

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:9.0

Trust: 0.3

vendor:adobemodel:acrobatscope:eqversion:9.2

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:9.2

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:9.1.3

Trust: 0.3

vendor:adobemodel:readerscope:neversion:9.3

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:8.1.6

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:9.1.3

Trust: 0.3

vendor:nortelmodel:networks self-service mpsscope:eqversion:5000

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:11.2

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:8.1.4

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:neversion:9.3

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:8.1.6

Trust: 0.3

vendor:adobemodel:acrobatscope:neversion:9.3

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:9.1.3

Trust: 0.3

vendor:adobemodel:acrobat standardscope:neversion:9.3

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:8.1

Trust: 0.3

vendor:nortelmodel:networks callpilot 1005rscope: - version: -

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:9.1.1

Trust: 0.3

vendor:nortelmodel:networks self-service peri applicationscope:eqversion:0

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:8.1.2

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:8.1.1

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:8.1.6

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:8.1.4

Trust: 0.3

vendor:nortelmodel:networks self-service media processing serverscope:eqversion:0

Trust: 0.3

vendor:adobemodel:readerscope:neversion:8.2

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:8.1.4

Trust: 0.3

vendor:nortelmodel:networks self-service speech serverscope:eqversion:0

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:11.1

Trust: 0.3

vendor:nortelmodel:networks callpilot 703tscope: - version: -

Trust: 0.3

vendor:susemodel:linux enterprise desktopscope:eqversion:11

Trust: 0.3

vendor:nortelmodel:networks callpilot 201iscope: - version: -

Trust: 0.3

vendor:nortelmodel:networks callpilot 200iscope: - version: -

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:8.1

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:8.1.2

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:8.1.3

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:8.0

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:8.1

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:9.1

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:8.1.1

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:8.1.2

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:neversion:8.2

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:8.1.1

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:9.1.2

Trust: 0.3

sources: CERT/CC: VU#773545 // CERT/CC: VU#508357 // BID: 37760 // JVNDB: JVNDB-2010-001018 // CNNVD: CNNVD-201001-091 // NVD: CVE-2009-3957

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2009-3957
value: MEDIUM

Trust: 1.0

CARNEGIE MELLON: VU#773545
value: 3.65

Trust: 0.8

CARNEGIE MELLON: VU#508357
value: 65.84

Trust: 0.8

NVD: CVE-2009-3957
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201001-091
value: MEDIUM

Trust: 0.6

VULHUB: VHN-41403
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2009-3957
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-41403
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#773545 // CERT/CC: VU#508357 // VULHUB: VHN-41403 // JVNDB: JVNDB-2010-001018 // CNNVD: CNNVD-201001-091 // NVD: CVE-2009-3957

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

problemtype:CWE-Other

Trust: 0.8

sources: JVNDB: JVNDB-2010-001018 // NVD: CVE-2009-3957

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201001-091

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-201001-091

CONFIGURATIONS

sources: JVNDB: JVNDB-2010-001018

PATCH

title:APSB10-02url:http://www.adobe.com/support/security/bulletins/apsb10-02.html

Trust: 0.8

title:APSB10-02url:http://www.adobe.com/jp/support/security/bulletins/apsb10-02.html

Trust: 0.8

title:TA10-013Aurl:http://software.fujitsu.com/jp/security/vulnerabilities/ta10-013a.html

Trust: 0.8

sources: JVNDB: JVNDB-2010-001018

EXTERNAL IDS

db:NVDid:CVE-2009-3957

Trust: 2.8

db:USCERTid:TA10-013A

Trust: 2.6

db:VUPENid:ADV-2010-0103

Trust: 2.5

db:SECTRACKid:1023446

Trust: 2.5

db:BIDid:37760

Trust: 2.2

db:CERT/CCid:VU#773545

Trust: 1.0

db:SECUNIAid:37690

Trust: 0.9

db:CERT/CCid:VU#508357

Trust: 0.9

db:OSVDBid:60980

Trust: 0.8

db:USCERTid:SA10-013A

Trust: 0.8

db:JVNDBid:JVNDB-2010-001018

Trust: 0.8

db:CNNVDid:CNNVD-201001-091

Trust: 0.7

db:NSFOCUSid:14336

Trust: 0.6

db:CERT/CCid:TA10-013A

Trust: 0.6

db:SUSEid:SUSE-SA:2010:008

Trust: 0.6

db:SECUNIAid:38131

Trust: 0.2

db:VULHUBid:VHN-41403

Trust: 0.1

db:PACKETSTORMid:83870

Trust: 0.1

db:PACKETSTORMid:85057

Trust: 0.1

db:PACKETSTORMid:85087

Trust: 0.1

sources: CERT/CC: VU#773545 // CERT/CC: VU#508357 // VULHUB: VHN-41403 // BID: 37760 // JVNDB: JVNDB-2010-001018 // PACKETSTORM: 83870 // PACKETSTORM: 85057 // PACKETSTORM: 85087 // CNNVD: CNNVD-201001-091 // NVD: CVE-2009-3957

REFERENCES

url:http://www.us-cert.gov/cas/techalerts/ta10-013a.html

Trust: 2.5

url:http://www.securitytracker.com/id?1023446

Trust: 2.5

url:http://www.vupen.com/english/advisories/2010/0103

Trust: 2.5

url:http://www.adobe.com/support/security/bulletins/apsb10-02.html

Trust: 2.1

url:http://www.securityfocus.com/bid/37760

Trust: 1.9

url:http://blogs.adobe.com/psirt/2009/12/new_adobe_reader_and_acrobat_v.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html

Trust: 1.7

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a7975

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/55555

Trust: 1.1

url:http://secunia.com/advisories/37690/

Trust: 0.9

url:about vulnerability notes

Trust: 0.8

url:contact us about this vulnerability

Trust: 0.8

url:provide a vendor statement

Trust: 0.8

url:http://www.adobe.com/support/security/advisories/apsa09-07.html

Trust: 0.8

url:http://kb2.adobe.com/cps/532/cpsid_53237.html

Trust: 0.8

url:http://osvdb.org/show/osvdb/60980

Trust: 0.8

url:http://www.symantec.com/connect/blogs/zero-day-xmas-present

Trust: 0.8

url:http://voices.washingtonpost.com/securityfix/2009/12/hackers_target_unpatched_adobe.html

Trust: 0.8

url:http://vrt-sourcefire.blogspot.com/2009/12/this-is-what-happens-when-you-try-to-do.html

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-3957

Trust: 0.8

url:http://www.ipa.go.jp/security/ciadr/vul/20100113-adobe.html

Trust: 0.8

url:http://www.jpcert.or.jp/at/2010/at100003.txt

Trust: 0.8

url:http://jvn.jp/cert/jvnta10-013a/

Trust: 0.8

url:http://jvn.jp/tr/jvntr-2010-03/

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-3957

Trust: 0.8

url:http://www.us-cert.gov/cas/alerts/sa10-013a.html

Trust: 0.8

url:http://www.npa.go.jp/cyberpolice/index.html#topics

Trust: 0.8

url:http://www.nsfocus.net/vulndb/14336

Trust: 0.6

url:http://www.adobe.com

Trust: 0.3

url:http://support.nortel.com/go/main.jsp?cscat=bltndetail&id=991610

Trust: 0.3

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.2

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.2

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.2

url:http://secunia.com/advisories/business_solutions/

Trust: 0.1

url:http://www.kb.cert.org/vuls/id/773545

Trust: 0.1

url:http://secunia.com/advisories/38131/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/

Trust: 0.1

url:http://www.adobe.com/support/security/bulletins/apsb10-02.html>

Trust: 0.1

url:https://www.kb.cert.org/vuls/id/773545>

Trust: 0.1

url:https://www.kb.cert.org/vuls/id/508357>

Trust: 0.1

url:http://www.us-cert.gov/cas/signup.html>.

Trust: 0.1

url:http://www.us-cert.gov/legal.html>

Trust: 0.1

url:http://www.us-cert.gov/cas/techalerts/ta10-013a.html>

Trust: 0.1

sources: CERT/CC: VU#773545 // CERT/CC: VU#508357 // VULHUB: VHN-41403 // BID: 37760 // JVNDB: JVNDB-2010-001018 // PACKETSTORM: 83870 // PACKETSTORM: 85057 // PACKETSTORM: 85087 // CNNVD: CNNVD-201001-091 // NVD: CVE-2009-3957

CREDITS

Didier Stevens

Trust: 0.9

sources: BID: 37760 // CNNVD: CNNVD-201001-091

SOURCES

db:CERT/CCid:VU#773545
db:CERT/CCid:VU#508357
db:VULHUBid:VHN-41403
db:BIDid:37760
db:JVNDBid:JVNDB-2010-001018
db:PACKETSTORMid:83870
db:PACKETSTORMid:85057
db:PACKETSTORMid:85087
db:CNNVDid:CNNVD-201001-091
db:NVDid:CVE-2009-3957

LAST UPDATE DATE

2024-11-23T20:11:49.689000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#773545date:2010-01-13T00:00:00
db:CERT/CCid:VU#508357date:2010-06-18T00:00:00
db:VULHUBid:VHN-41403date:2018-10-30T00:00:00
db:BIDid:37760date:2010-02-01T21:22:00
db:JVNDBid:JVNDB-2010-001018date:2010-02-10T00:00:00
db:CNNVDid:CNNVD-201001-091date:2010-01-13T00:00:00
db:NVDid:CVE-2009-3957date:2024-11-21T01:08:36.317

SOURCES RELEASE DATE

db:CERT/CCid:VU#773545date:2010-01-13T00:00:00
db:CERT/CCid:VU#508357date:2009-12-15T00:00:00
db:VULHUBid:VHN-41403date:2010-01-13T00:00:00
db:BIDid:37760date:2010-01-12T00:00:00
db:JVNDBid:JVNDB-2010-001018date:2010-02-10T00:00:00
db:PACKETSTORMid:83870date:2009-12-15T13:39:57
db:PACKETSTORMid:85057date:2010-01-13T17:35:06
db:PACKETSTORMid:85087date:2010-01-14T02:46:00
db:CNNVDid:CNNVD-201001-091date:2010-01-13T00:00:00
db:NVDid:CVE-2009-3957date:2010-01-13T19:30:00.530