Описание
Use-after-free vulnerability in the Doc.media.newPlayer method in Multimedia.api in Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, allows remote attackers to execute arbitrary code via a crafted PDF file using ZLib compressed streams, as exploited in the wild in December 2009.
| Релиз | Статус | Примечание |
|---|---|---|
| dapper | ignored | |
| devel | released | 9.3.2-lucid1 |
| hardy | released | 9.3.1-1hardy2 |
| intrepid | released | 9.3.1-1intrepid1 |
| jaunty | released | 9.3.1-1jaunty1 |
| karmic | released | 9.3.1-1karmic1 |
| upstream | needs-triage |
Показывать по
9.3 Critical
CVSS2
7.8 High
CVSS3
Связанные уязвимости
Use-after-free vulnerability in the Doc.media.newPlayer method in Multimedia.api in Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, allows remote attackers to execute arbitrary code via a crafted PDF file using ZLib compressed streams, as exploited in the wild in December 2009.
Use-after-free vulnerability in the Doc.media.newPlayer method in Multimedia.api in Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, allows remote attackers to execute arbitrary code via a crafted PDF file using ZLib compressed streams, as exploited in the wild in December 2009.
Use-after-free vulnerability in the Doc.media.newPlayer method in Multimedia.api in Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, allows remote attackers to execute arbitrary code via a crafted PDF file using ZLib compressed streams, as exploited in the wild in December 2009.
Уязвимость метода Doc.media.newPlayer программ просмотра и редактирования PDF-файлов Adobe Reader и Adobe Acrobat, позволяющая нарушителю выполнить произвольный код
9.3 Critical
CVSS2
7.8 High
CVSS3