CVE-2009-0927

HIGH
2009-03-19 [email protected]
8.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

5
Analysis Generated
Mar 26, 2026 - 11:17 vuln.today
Added to CISA KEV
Oct 22, 2025 - 01:15 cisa
CISA KEV
PoC Detected
Oct 22, 2025 - 01:15 vuln.today
Public exploit code
Patch Released
Oct 22, 2025 - 01:15 nvd
Patch available
CVE Published
Mar 19, 2009 - 10:30 nvd
HIGH 8.8

Description

Stack-based buffer overflow in Adobe Reader and Adobe Acrobat 9 before 9.1, 8 before 8.1.3 , and 7 before 7.1.1 allows remote attackers to execute arbitrary code via a crafted argument to the getIcon method of a Collab object, a different vulnerability than CVE-2009-0658.

Analysis

Adobe Reader and Acrobat 9.x, 8.x, and 7.x contain a stack-based buffer overflow in the getIcon method of the Collab object that allows remote attackers to execute arbitrary code via a crafted PDF argument.

Technical Context

The CWE-20 vulnerability is triggered when a PDF contains JavaScript that calls Collab.getIcon() with an overly long argument, overflowing the stack buffer and allowing the attacker to control the instruction pointer for arbitrary code execution.

Affected Products

['Adobe Reader 9 before 9.1', 'Adobe Reader 8 before 8.1.3', 'Adobe Reader 7 before 7.1.1', 'Adobe Acrobat 9 before 9.1', 'Adobe Acrobat 8 before 8.1.3', 'Adobe Acrobat 7 before 7.1.1']

Remediation

Upgrade to patched Adobe Reader/Acrobat versions. Modern systems should use alternative PDF readers with sandboxing. Disable JavaScript execution in PDF readers where possible.

Priority Score

54
Low Medium High Critical
KEV: +50
EPSS: +93.3
CVSS: +44
POC: +20

Share

CVE-2009-0927 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy