The JavaScript API in Adobe Reader and Acrobat 9.x before 9.5.1 and 10.x before 10.1.3 on Mac OS X and Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
References
Link | Resource |
---|---|
http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00013.html | Broken Link Mailing List Third Party Advisory |
http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00016.html | Broken Link Mailing List Third Party Advisory |
http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00017.html | Broken Link Mailing List Third Party Advisory |
http://rhn.redhat.com/errata/RHSA-2012-0469.html | Third Party Advisory |
http://secunia.com/advisories/48756 | Broken Link |
http://secunia.com/advisories/48846 | Broken Link |
http://www.adobe.com/support/security/bulletins/apsb12-08.html | Vendor Advisory |
http://www.securityfocus.com/bid/52950 | Broken Link Third Party Advisory VDB Entry |
http://www.securitytracker.com/id?1026908 | Broken Link Third Party Advisory VDB Entry |
http://www.us-cert.gov/cas/techalerts/TA12-101B.html | Mitigation Third Party Advisory US Government Resource |
https://exchange.xforce.ibmcloud.com/vulnerabilities/74735 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
History
14 Dec 2022, 19:04
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:adobe:acrobat:10.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.3.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:10.0.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.3:-:pro:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:10.0:-:pro:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.4.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.1.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.4.5:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.3.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.3.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:10.0.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.4.4:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.4.7:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:10.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:10.0.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.4:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:10.1.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.4:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.4.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.3.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.5:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.4.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.3.4:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.4.5:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.0:-:pro:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.4.7:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:10.0.1:-:pro:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.3.4:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.3.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.4.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.4.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.4.6:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.4.6:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.3.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.1:-:pro:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.5:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.1.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.4.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:10.1.2:*:*:*:*:*:*:* |
cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:* |
CVSS |
v2 : v3 : |
v2 : 6.8
v3 : unknown |
References | (CONFIRM) http://www.adobe.com/support/security/bulletins/apsb12-08.html - Vendor Advisory | |
References | (SECTRACK) http://www.securitytracker.com/id?1026908 - Broken Link, Third Party Advisory, VDB Entry | |
References | (CERT) http://www.us-cert.gov/cas/techalerts/TA12-101B.html - Mitigation, Third Party Advisory, US Government Resource | |
References | (REDHAT) http://rhn.redhat.com/errata/RHSA-2012-0469.html - Third Party Advisory | |
References | (SUSE) http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00013.html - Broken Link, Mailing List, Third Party Advisory | |
References | (BID) http://www.securityfocus.com/bid/52950 - Broken Link, Third Party Advisory, VDB Entry | |
References | (SECUNIA) http://secunia.com/advisories/48846 - Broken Link | |
References | (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/74735 - Third Party Advisory, VDB Entry | |
References | (SECUNIA) http://secunia.com/advisories/48756 - Broken Link | |
References | (SUSE) http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00017.html - Broken Link, Mailing List, Third Party Advisory | |
References | (SUSE) http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00016.html - Broken Link, Mailing List, Third Party Advisory |
Information
Published : 2012-04-10 23:55
Updated : 2024-02-04 18:16
NVD link : CVE-2012-0777
Mitre link : CVE-2012-0777
CVE.ORG link : CVE-2012-0777
JSON object : View
Products Affected
apple
- mac_os_x
adobe
- acrobat
- acrobat_reader
linux
- linux_kernel
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer