CVE-2009-4324
Adobe Acrobat and Reader Use-After-Free Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
4Exploited in Wild
YesDecision
Descriptions
Use-after-free vulnerability in the Doc.media.newPlayer method in Multimedia.api in Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, allows remote attackers to execute arbitrary code via a crafted PDF file using ZLib compressed streams, as exploited in the wild in December 2009.
La vulnerabilidad de uso de la memoria previamente liberada (Use-after-free) en la función Doc.media.newPlayer en el archivo Multimedia.api en Adobe Reader y Acrobat versión 9.x anterior a 9.3, y versión 8.x anterior a 8.2 en Windows y Mac OS X, permite a los atacantes remotos ejecutar código arbitrario por medio de un archivo PDF creado utilizando una transmisión comprimida ZLib, tal como se explotó “in the wild” en diciembre de 2009.
Use-after-free vulnerability in Adobe Acrobat and Reader allows remote attackers to execute code via a crafted PDF file.
CVSS Scores
SSVC
- Decision:Act
Timeline
- 2009-12-14 CVE Reserved
- 2009-12-15 CVE Published
- 2009-12-23 First Exploit
- 2022-06-08 Exploited in Wild
- 2022-06-22 KEV Due Date
- 2025-02-04 CVE Updated
- 2025-03-30 EPSS Updated
CWE
- CWE-416: Use After Free
CAPEC
References (25)
URL | Tag | Source |
---|---|---|
http://osvdb.org/60980 | Broken Link | |
http://www.adobe.com/support/security/bulletins/apsb10-02.html | Not Applicable | |
http://www.kb.cert.org/vuls/id/508357 | Third Party Advisory |
|
http://www.metasploit.com/redmine/projects/framework/repository/revisions/7881/entry/modules/exploits/windows/fileformat/adobe_media_newplayer.rb | Broken Link | |
http://www.securityfocus.com/bid/37331 | Broken Link | |
http://www.shadowserver.org/wiki/pmwiki.php/Calendar/20091214 | Broken Link | |
http://www.symantec.com/connect/blogs/zero-day-xmas-present | Broken Link | |
http://www.us-cert.gov/cas/techalerts/TA10-013A.html | Third Party Advisory | |
http://www.vupen.com/english/advisories/2010/0103 | Broken Link | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/54747 | Third Party Advisory | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6795 | Broken Link |
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/16503 | 2010-04-30 | |
https://www.exploit-db.com/exploits/16623 | 2010-09-25 | |
https://www.exploit-db.com/exploits/10618 | 2009-12-23 | |
http://contagiodump.blogspot.com/2009/12/virustotal-httpwww.html | 2025-02-04 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://blogs.adobe.com/psirt/2009/12/new_adobe_reader_and_acrobat_v.html | 2024-06-28 | |
http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html | 2024-06-28 | |
http://secunia.com/advisories/37690 | 2024-06-28 | |
http://secunia.com/advisories/38138 | 2024-06-28 | |
http://secunia.com/advisories/38215 | 2024-06-28 | |
http://www.adobe.com/support/security/advisories/apsa09-07.html | 2024-06-28 | |
http://www.redhat.com/support/errata/RHSA-2010-0060.html | 2024-06-28 | |
http://www.vupen.com/english/advisories/2009/3518 | 2024-06-28 | |
https://bugzilla.redhat.com/show_bug.cgi?id=547799 | 2010-01-20 | |
https://access.redhat.com/security/cve/CVE-2009-4324 | 2010-01-20 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Adobe Search vendor "Adobe" | Acrobat Search vendor "Adobe" for product "Acrobat" | >= 8.0 < 8.2 Search vendor "Adobe" for product "Acrobat" and version " >= 8.0 < 8.2" | - |
Affected
| in | Apple Search vendor "Apple" | Mac Os X Search vendor "Apple" for product "Mac Os X" | - | - |
Safe
|
Adobe Search vendor "Adobe" | Acrobat Search vendor "Adobe" for product "Acrobat" | >= 8.0 < 8.2 Search vendor "Adobe" for product "Acrobat" and version " >= 8.0 < 8.2" | - |
Affected
| in | Microsoft Search vendor "Microsoft" | Windows Search vendor "Microsoft" for product "Windows" | - | - |
Safe
|
Adobe Search vendor "Adobe" | Acrobat Search vendor "Adobe" for product "Acrobat" | >= 9.0 < 9.3 Search vendor "Adobe" for product "Acrobat" and version " >= 9.0 < 9.3" | - |
Affected
| in | Apple Search vendor "Apple" | Mac Os X Search vendor "Apple" for product "Mac Os X" | - | - |
Safe
|
Adobe Search vendor "Adobe" | Acrobat Search vendor "Adobe" for product "Acrobat" | >= 9.0 < 9.3 Search vendor "Adobe" for product "Acrobat" and version " >= 9.0 < 9.3" | - |
Affected
| in | Microsoft Search vendor "Microsoft" | Windows Search vendor "Microsoft" for product "Windows" | - | - |
Safe
|
Adobe Search vendor "Adobe" | Acrobat Reader Search vendor "Adobe" for product "Acrobat Reader" | >= 8.0 < 8.2 Search vendor "Adobe" for product "Acrobat Reader" and version " >= 8.0 < 8.2" | - |
Affected
| in | Apple Search vendor "Apple" | Mac Os X Search vendor "Apple" for product "Mac Os X" | - | - |
Safe
|
Adobe Search vendor "Adobe" | Acrobat Reader Search vendor "Adobe" for product "Acrobat Reader" | >= 8.0 < 8.2 Search vendor "Adobe" for product "Acrobat Reader" and version " >= 8.0 < 8.2" | - |
Affected
| in | Microsoft Search vendor "Microsoft" | Windows Search vendor "Microsoft" for product "Windows" | - | - |
Safe
|
Adobe Search vendor "Adobe" | Acrobat Reader Search vendor "Adobe" for product "Acrobat Reader" | >= 9.0 < 9.3 Search vendor "Adobe" for product "Acrobat Reader" and version " >= 9.0 < 9.3" | - |
Affected
| in | Apple Search vendor "Apple" | Mac Os X Search vendor "Apple" for product "Mac Os X" | - | - |
Safe
|
Adobe Search vendor "Adobe" | Acrobat Reader Search vendor "Adobe" for product "Acrobat Reader" | >= 9.0 < 9.3 Search vendor "Adobe" for product "Acrobat Reader" and version " >= 9.0 < 9.3" | - |
Affected
| in | Microsoft Search vendor "Microsoft" | Windows Search vendor "Microsoft" for product "Windows" | - | - |
Safe
|
Suse Search vendor "Suse" | Linux Enterprise Debuginfo Search vendor "Suse" for product "Linux Enterprise Debuginfo" | 11 Search vendor "Suse" for product "Linux Enterprise Debuginfo" and version "11" | - |
Affected
| ||||||
Opensuse Search vendor "Opensuse" | Opensuse Search vendor "Opensuse" for product "Opensuse" | 11.1 Search vendor "Opensuse" for product "Opensuse" and version "11.1" | - |
Affected
| ||||||
Opensuse Search vendor "Opensuse" | Opensuse Search vendor "Opensuse" for product "Opensuse" | 11.2 Search vendor "Opensuse" for product "Opensuse" and version "11.2" | - |
Affected
| ||||||
Suse Search vendor "Suse" | Linux Enterprise Search vendor "Suse" for product "Linux Enterprise" | 10.0 Search vendor "Suse" for product "Linux Enterprise" and version "10.0" | sp2 |
Affected
| ||||||
Suse Search vendor "Suse" | Linux Enterprise Search vendor "Suse" for product "Linux Enterprise" | 10.0 Search vendor "Suse" for product "Linux Enterprise" and version "10.0" | sp3 |
Affected
|