CVE-2009-4324
HIGHCVSS Vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Lifecycle Timeline
4Description
Use-after-free vulnerability in the Doc.media.newPlayer method in Multimedia.api in Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, allows remote attackers to execute arbitrary code via a crafted PDF file using ZLib compressed streams, as exploited in the wild in December 2009.
Analysis
Adobe Reader and Acrobat contain a use-after-free vulnerability in the Doc.media.newPlayer JavaScript method that was actively exploited as a zero-day in December 2009 via crafted PDF files with ZLib compressed streams.
Technical Context
The CWE-416 flaw occurs when JavaScript code triggers the Doc.media.newPlayer method, causing a media player object to be freed while still referenced. Subsequent access to the freed object allows attackers to control execution flow. Exploits used ZLib compressed streams to bypass detection.
Affected Products
['Adobe Reader 9.x before 9.3', 'Adobe Reader 8.x before 8.2', 'Adobe Acrobat 9.x before 9.3', 'Adobe Acrobat 8.x before 8.2']
Remediation
Update to Adobe Reader/Acrobat 9.3+ or 8.2+. Modern mitigation: deploy PDF readers with exploit mitigations (sandbox, DEP, ASLR) or use browser-based PDF rendering.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today