← Zuruck zu CVEs
CVE-2011-4369
N/ABeschreibung
Unspecified vulnerability in the PRC component in Adobe Reader and Acrobat 9.x before 9.4.7 on Windows, Adobe Reader and Acrobat 9.x through 9.4.6 on Mac OS X, Adobe Reader and Acrobat 10.x through 10.1.1 on Windows and Mac OS X, and Adobe Reader 9.x through 9.4.6 on UNIX allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, as exploited in the wild in December 2011.
CVE Details
CVSS v3.1 BewertungN/A
Veroffentlicht12/16/2011
Zuletzt geandert4/11/2025
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
adobe:acrobatadobe:acrobat_readerapple:mac_os_xmicrosoft:windowsunix:unix
Referenzen
http://www.adobe.com/support/security/bulletins/apsb11-30.html(psirt@adobe.com)
http://www.adobe.com/support/security/bulletins/apsb12-01.html(psirt@adobe.com)
http://www.redhat.com/support/errata/RHSA-2012-0011.html(psirt@adobe.com)
http://www.securityfocus.com/bid/51092(psirt@adobe.com)
http://www.us-cert.gov/cas/techalerts/TA11-350A.html(psirt@adobe.com)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14865(psirt@adobe.com)
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00019.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00020.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.adobe.com/support/security/bulletins/apsb11-30.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.adobe.com/support/security/bulletins/apsb12-01.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2012-0011.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/51092(af854a3a-2127-422b-91ae-364da2661108)
http://www.us-cert.gov/cas/techalerts/TA11-350A.html(af854a3a-2127-422b-91ae-364da2661108)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14865(af854a3a-2127-422b-91ae-364da2661108)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.