Описание
Use-after-free vulnerability in the Doc.media.newPlayer method in Multimedia.api in Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, allows remote attackers to execute arbitrary code via a crafted PDF file using ZLib compressed streams, as exploited in the wild in December 2009.
Ссылки
- Broken LinkVendor Advisory
- ExploitThird Party Advisory
- Mailing ListThird Party Advisory
- Broken Link
- Broken LinkVendor Advisory
- Broken LinkVendor Advisory
- Broken LinkVendor Advisory
- Vendor Advisory
- Not Applicable
- Third Party AdvisoryUS Government Resource
- Broken Link
- Broken Link
- Broken LinkThird Party AdvisoryVDB Entry
- Broken Link
- Broken Link
- Third Party AdvisoryUS Government Resource
- Broken LinkVendor Advisory
- Broken Link
- Issue Tracking
- Third Party AdvisoryVDB Entry
Уязвимые конфигурации
Одновременно
Одно из
Одно из
Одно из
EPSS
7.8 High
CVSS3
9.3 Critical
CVSS2
Дефекты
Связанные уязвимости
Use-after-free vulnerability in the Doc.media.newPlayer method in Multimedia.api in Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, allows remote attackers to execute arbitrary code via a crafted PDF file using ZLib compressed streams, as exploited in the wild in December 2009.
Use-after-free vulnerability in the Doc.media.newPlayer method in Multimedia.api in Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, allows remote attackers to execute arbitrary code via a crafted PDF file using ZLib compressed streams, as exploited in the wild in December 2009.
Use-after-free vulnerability in the Doc.media.newPlayer method in Multimedia.api in Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, allows remote attackers to execute arbitrary code via a crafted PDF file using ZLib compressed streams, as exploited in the wild in December 2009.
Уязвимость метода Doc.media.newPlayer программ просмотра и редактирования PDF-файлов Adobe Reader и Adobe Acrobat, позволяющая нарушителю выполнить произвольный код
EPSS
7.8 High
CVSS3
9.3 Critical
CVSS2