The JavaScript for Acrobat API in Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 does not properly implement the (1) Privileged Context and (2) Safe Path restrictions for unspecified JavaScript methods, which allows remote attackers to create arbitrary files, and possibly execute arbitrary code, via the cPath parameter in a crafted PDF file. NOTE: some of these details are obtained from third party information.
References
Link | Resource |
---|---|
http://securitytracker.com/id?1023007 | |
http://www.adobe.com/support/security/bulletins/apsb09-15.html | Patch Vendor Advisory |
http://www.kb.cert.org/vuls/id/257117 | Patch US Government Resource |
http://www.securityfocus.com/bid/36638 | |
http://www.securityfocus.com/bid/36664 | |
http://www.us-cert.gov/cas/techalerts/TA09-286B.html | Patch US Government Resource |
http://www.vupen.com/english/advisories/2009/2898 | Patch Vendor Advisory |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5822 |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
No history.
Information
Published : 2009-10-19 22:30
Updated : 2024-02-04 17:33
NVD link : CVE-2009-2993
Mitre link : CVE-2009-2993
CVE.ORG link : CVE-2009-2993
JSON object : View
Products Affected
adobe
- acrobat
- acrobat_reader
CWE
CWE-20
Improper Input Validation