TROYANOSYVIRUS
Back to CVEs

CVE-2009-4324

HIGHCISA KEV
7.8

Description

Use-after-free vulnerability in the Doc.media.newPlayer method in Multimedia.api in Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, allows remote attackers to execute arbitrary code via a crafted PDF file using ZLib compressed streams, as exploited in the wild in December 2009.

CVE Details

CVSS v3.1 Score7.8
SeverityHIGH
CVSS VectorCVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack VectorLOCAL
ComplexityLOW
Privileges RequiredNONE
User InteractionREQUIRED
Published12/15/2009
Last Modified4/21/2026
Sourcekev
Honeypot Sightings0

CISA KEV

VendorAdobe
ProductAcrobat and Reader
Vulnerability NameAdobe Acrobat and Reader Use-After-Free Vulnerability
KEV Date Added2022-06-08
Remediation Due Date2022-06-22
Ransomware UseUnknown

Affected Products

adobe:acrobatadobe:acrobat_readerapple:mac_os_xmicrosoft:windowsopensuse:opensusesuse:linux_enterprisesuse:linux_enterprise_debuginfo

Weaknesses (CWE)

CWE-416CWE-416

References

http://osvdb.org/60980(psirt@adobe.com)
http://osvdb.org/60980(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/37690(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/38138(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/38215(af854a3a-2127-422b-91ae-364da2661108)
http://www.kb.cert.org/vuls/id/508357(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2010-0060.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/37331(af854a3a-2127-422b-91ae-364da2661108)
http://www.us-cert.gov/cas/techalerts/TA10-013A.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2009/3518(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2010/0103(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=547799(af854a3a-2127-422b-91ae-364da2661108)

IOC Correlations

No correlations recorded

This product uses data from the NVD API but is not endorsed or certified by the NVD.