VRDA Feed by JPCERT/CC
  Vulnerability Response Decision Assistance Feed : Information for vulnerability impact analysis
[ about VRDA Feed | JPCERT/CC



 
Vulnerability Analysis Result (Revision No : 1) [ Download XML
JVNVU#508357     ( CVE-2009-4324 )
Adobe Acrobat and Reader contain a use-after-free vulnerability in the JavaScript Doc.media.newPlayer method
http://jvn.jp/cert/JVNVU508357/index.html

Adobe Reader および Acrobat の Doc.media.newPlayer メソッドには、解放済みメモリを使用する (use-after-free) 脆弱性が存在します。




About This Analysis Information
Analysis Information Provider:
JPCERT/CC
First Published:
2009-12-16
Source Information Category:
Advisory, Alert
Last Updated:
2009-12-16




Affected Product Tags
cpe:/a:adobe:acrobat     (Adobe Acrobat)
lapt:/a:adobe:reader     (Adobe Reader)
 


Vulnerability Analysis Results
[Information Source Reliability] [?]
Low [?]

Medium [?]
X High [?]

[Impact Level] [?]
Low [?]

Low-Medium [?]
X Medium-High [?]
High [?]

[Access Required] [?]
Physical [?]

Local [?]
Non-routed [?]
X Routed [?]

[Authentication] [?]
Privileged [?]

Standard [?]
Limited [?]
X None or Unnecessary [?]

[User Interaction Required] [?]
Complex [?]

X Simple [?]
None [?]

[Technical Difficulty] [?]
High [?]

Medium-High [?]
Low-Medium [?]
X Low [?]

[Availability of Remediation] [?]
Official Patch [?]

X Official Workaround [?]
Unofficial Patch [?]
None [?]

[Incident Activity] [?]
None [?]

X Exploit or PoC [?]
Activity Observed [?]

Alternatives
Common Vulnerabilities and Exposures (CVE) CVE-2009-4324
Use-after-free vulnerability in Doc.media.newPlayer in Adobe Readerand Acrobat 8.0 through 9.2, and possibly earlier versions, allowsremote attackers to execute arbitrary code via a crafted PDF fileusing ZLib compressed streams, as exploited in the wild inDecember 2009.








References

Copyright © 2009 JPCERT/CC All Rights Reserved.