Unspecified vulnerability in the U3D component in Adobe Reader and Acrobat 10.1.1 and earlier on Windows and Mac OS X, and Adobe Reader 9.x through 9.4.6 on UNIX, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, as exploited in the wild in December 2011.
References
Configurations
Configuration 1 (hide)
| AND |
|
Configuration 2 (hide)
| AND |
|
History
22 Oct 2025, 01:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Oct 2025, 20:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Oct 2025, 19:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Nov 2024, 01:28
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00019.html - Broken Link | |
| References | () http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00020.html - Broken Link | |
| References | () http://www.adobe.com/support/security/advisories/apsa11-04.html - Vendor Advisory | |
| References | () http://www.adobe.com/support/security/bulletins/apsb11-30.html - Not Applicable | |
| References | () http://www.adobe.com/support/security/bulletins/apsb12-01.html - Not Applicable | |
| References | () http://www.redhat.com/support/errata/RHSA-2012-0011.html - Broken Link | |
| References | () http://www.us-cert.gov/cas/techalerts/TA11-350A.html - Third Party Advisory, US Government Resource | |
| References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14562 - Broken Link |
28 Jun 2024, 14:21
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00019.html - Broken Link | |
| References | () http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00020.html - Broken Link | |
| References | () http://www.adobe.com/support/security/bulletins/apsb11-30.html - Not Applicable | |
| References | () http://www.adobe.com/support/security/bulletins/apsb12-01.html - Not Applicable | |
| References | () http://www.redhat.com/support/errata/RHSA-2012-0011.html - Broken Link | |
| References | () http://www.us-cert.gov/cas/techalerts/TA11-350A.html - Third Party Advisory, US Government Resource | |
| References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14562 - Broken Link | |
| CVSS |
v2 : v3 : |
v2 : 10.0
v3 : 9.8 |
| CPE | cpe:2.3:a:adobe:acrobat_reader:9.3.4:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:10.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:8.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:8.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.4.6:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:10.0.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:8.1.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:8.1.4:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:7.0.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:10.0.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:5.0.10:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.3.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:8.1.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:4.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:8.1.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:7.0.4:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:7.1.4:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:4.0.5a:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:10.0.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:7.0.9:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:6.0.6:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.3.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:7.0.7:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:3.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:10.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:6.0.5:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:4.0:*:*:*:*:*:*:* cpe:2.3:o:unix:unix:*:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:5.0.6:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:3.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.3.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:5.0.5:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:8.2.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:6.0.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:8.2.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:6.0.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.4.5:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.4.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:7.1.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.3.4:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:4.0.5a:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.4.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:7.0.5:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:5.0.10:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:8.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.4:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.1.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:8.2.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:10.0.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:6.0.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:6.0.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:10.0.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:3.01:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:7.0.4:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:5.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:8.1.4:*:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.3.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.3.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:7:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:7.0.5:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:6.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:7.0.8:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.4.4:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:4.0.5c:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.4.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:3.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:8.1.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:7.1.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:8.1.7:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:5.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.3.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:8.2.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:10.0.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:7.1.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:4.0.5:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.4.6:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:7.0.7:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:6.0.5:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:8.2.4:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:8.1.6:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:7.0.6:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:8.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.3.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:7.0.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:5.0.7:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:8.2.4:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:8.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:8.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.4.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:6.0.4:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:7.0.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.4.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:7.0.9:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:7.0.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:8.1.6:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:8.1.5:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:4.0.5:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:5.0.11:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:5.0.6:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.1.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:8.1.5:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:6.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:7.1.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:6.0.4:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:10.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:7.1.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:4.5:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:8.2.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.4.5:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:8.1.7:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:4.0.5c:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.4.4:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:7.0.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:7.0.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:7.0.8:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:8.2.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:5.0.9:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:6.0.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:5.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:6.0.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:7.0.6:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:3.02:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.4.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:7.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:8:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:7.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:5.0.5:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:8.1.1:*:*:*:*:*:*:* |
cpe:2.3:o:opengroup:unix:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:* |
| First Time |
Opengroup unix
Opengroup |
|
| CWE | CWE-787 |
Information
Published : 2011-12-07 19:55
Updated : 2025-10-22 01:15
NVD link : CVE-2011-2462
Mitre link : CVE-2011-2462
CVE.ORG link : CVE-2011-2462
JSON object : View
Products Affected
apple
- mac_os_x
opengroup
- unix
adobe
- acrobat_reader
- acrobat
microsoft
- windows
CWE
CWE-787
Out-of-bounds Write
