The JavaScript for Acrobat API in Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 does not properly implement the (1) Privileged Context and (2) Safe Path restrictions for unspecified JavaScript methods, which allows remote attackers to create arbitrary files, and possibly execute arbitrary code, via the cPath parameter in a crafted PDF file. NOTE: some of these details are obtained from third party information.
References
Link | Resource |
---|---|
http://securitytracker.com/id?1023007 | |
http://www.adobe.com/support/security/bulletins/apsb09-15.html | Patch Vendor Advisory |
http://www.kb.cert.org/vuls/id/257117 | Patch US Government Resource |
http://www.securityfocus.com/bid/36638 | |
http://www.securityfocus.com/bid/36664 | |
http://www.us-cert.gov/cas/techalerts/TA09-286B.html | Patch US Government Resource |
http://www.vupen.com/english/advisories/2009/2898 | Patch Vendor Advisory |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5822 |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2009-10-19T22:00:00
Updated: 2017-09-18T12:57:01
Reserved: 2009-08-27T00:00:00
Link: CVE-2009-2993
JSON object: View
NVD Information
Status : Modified
Published: 2009-10-19T22:30:00.577
Modified: 2018-10-30T16:25:16.967
Link: CVE-2009-2993
JSON object: View
Redhat Information
No data.
CWE