CVE-2009-0927
HIGHCVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Lifecycle Timeline
5Description
Stack-based buffer overflow in Adobe Reader and Adobe Acrobat 9 before 9.1, 8 before 8.1.3 , and 7 before 7.1.1 allows remote attackers to execute arbitrary code via a crafted argument to the getIcon method of a Collab object, a different vulnerability than CVE-2009-0658.
Analysis
Adobe Reader and Acrobat 9.x, 8.x, and 7.x contain a stack-based buffer overflow in the getIcon method of the Collab object that allows remote attackers to execute arbitrary code via a crafted PDF argument.
Technical Context
The CWE-20 vulnerability is triggered when a PDF contains JavaScript that calls Collab.getIcon() with an overly long argument, overflowing the stack buffer and allowing the attacker to control the instruction pointer for arbitrary code execution.
Affected Products
['Adobe Reader 9 before 9.1', 'Adobe Reader 8 before 8.1.3', 'Adobe Reader 7 before 7.1.1', 'Adobe Acrobat 9 before 9.1', 'Adobe Acrobat 8 before 8.1.3', 'Adobe Acrobat 7 before 7.1.1']
Remediation
Upgrade to patched Adobe Reader/Acrobat versions. Modern systems should use alternative PDF readers with sandboxing. Disable JavaScript execution in PDF readers where possible.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today