The JavaScript for Acrobat API in Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 does not properly implement the (1) Privileged Context and (2) Safe Path restrictions for unspecified JavaScript methods, which allows remote attackers to create arbitrary files, and possibly execute arbitrary code, via the cPath parameter in a crafted PDF file. NOTE: some of these details are obtained from third party information.
References
Link | Resource |
---|---|
http://www.us-cert.gov/cas/techalerts/TA09-286B.html | Patch US Government Resource |
http://www.securityfocus.com/bid/36638 | |
http://www.vupen.com/english/advisories/2009/2898 | Patch Vendor Advisory |
http://securitytracker.com/id?1023007 | |
http://www.kb.cert.org/vuls/id/257117 | Patch US Government Resource |
http://www.securityfocus.com/bid/36664 | |
http://www.adobe.com/support/security/bulletins/apsb09-15.html | Patch Vendor Advisory |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5822 |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2009-10-19 15:30
Updated : 2018-10-30 09:25
NVD link : CVE-2009-2993
Mitre link : CVE-2009-2993
JSON object : View
CWE
CWE-20
Improper Input Validation
Products Affected
adobe
- acrobat_reader
- acrobat