TROYANOSYVIRUS
Volver a CVEs

CVE-2009-1862

HIGHCISA KEV
7.8

Descripcion

Unspecified vulnerability in Adobe Reader and Acrobat 9.x through 9.1.2, and Adobe Flash Player 9.x through 9.0.159.0 and 10.x through 10.0.22.87, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via (1) a crafted Flash application in a .pdf file or (2) a crafted .swf file, related to authplay.dll, as exploited in the wild in July 2009.

Detalles CVE

Puntuacion CVSS v3.17.8
SeveridadHIGH
Vector CVSSCVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Vector de ataqueLOCAL
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioREQUIRED
Publicado7/23/2009
Ultima modificacion10/22/2025
Fuentekev
Avistamientos honeypot0

CISA KEV

VendedorAdobe
ProductoAcrobat and Reader, Flash Player
Nombre vulnerabilidadAdobe Acrobat and Reader, Flash Player Unspecified Vulnerability
Fecha inclusion KEV2022-06-08
Fecha limite remediacion2022-06-22
Uso en ransomwareUnknown

Productos afectados

adobe:acrobatadobe:acrobat_readeradobe:flash_player

Debilidades (CWE)

CWE-787CWE-787

Referencias

http://bugs.adobe.com/jira/browse/FP-1265(af854a3a-2127-422b-91ae-364da2661108)
http://isc.sans.org/diary.html?storyid=6847(af854a3a-2127-422b-91ae-364da2661108)
http://news.cnet.com/8301-27080_3-10293389-245.html(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/36193(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/36374(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/36701(af854a3a-2127-422b-91ae-364da2661108)
http://security.gentoo.org/glsa/glsa-200908-04.xml(af854a3a-2127-422b-91ae-364da2661108)
http://support.apple.com/kb/HT3864(af854a3a-2127-422b-91ae-364da2661108)
http://support.apple.com/kb/HT3865(af854a3a-2127-422b-91ae-364da2661108)
http://www.kb.cert.org/vuls/id/259425(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/35759(af854a3a-2127-422b-91ae-364da2661108)

Correlaciones IOC

Sin correlaciones registradas

This product uses data from the NVD API but is not endorsed or certified by the NVD.