Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*", "matchCriteriaId": "84209F08-D75D-4C02-94E4-5942B244E632", "versionEndIncluding": "9.1.3", "vulnerable": true}, {"criteria": "cpe:2.3:a:adobe:acrobat:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "465F9134-DD86-4F13-8C39-949BE6E7389A", "vulnerable": true}, {"criteria": "cpe:2.3:a:adobe:acrobat:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "BB041EDF-EFF8-4AA6-8D59-411975547534", "vulnerable": true}, {"criteria": "cpe:2.3:a:adobe:acrobat:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "4C05F6A5-0FB3-489B-9B8B-64C569C03D7A", "vulnerable": true}, {"criteria": "cpe:2.3:a:adobe:acrobat:4.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "AABA4FE3-662B-4956-904D-45086E000890", "vulnerable": true}, {"criteria": "cpe:2.3:a:adobe:acrobat:4.0.5a:*:*:*:*:*:*:*", "matchCriteriaId": "998CD79C-458E-46A8-8261-1C40C53D9FA5", "vulnerable": true}, {"criteria": "cpe:2.3:a:adobe:acrobat:4.0.5c:*:*:*:*:*:*:*", "matchCriteriaId": "0155FB0B-7FAD-4388-96C8-A8543B4FDFD9", "vulnerable": true}, {"criteria": "cpe:2.3:a:adobe:acrobat:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "201F059D-33D1-4D9F-9C6F-FC8EB49E4735", "vulnerable": true}, {"criteria": "cpe:2.3:a:adobe:acrobat:5.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "B025E795-5713-485E-8A15-EBE4451A1A46", "vulnerable": true}, {"criteria": "cpe:2.3:a:adobe:acrobat:5.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "B453FA1D-0FE9-4324-9644-E167561926C2", "vulnerable": true}, {"criteria": "cpe:2.3:a:adobe:acrobat:5.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "FDEA946E-B6D2-463B-89D0-F2F37278089E", "vulnerable": true}, {"criteria": "cpe:2.3:a:adobe:acrobat:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "183B5940-2310-4D2E-99F0-9792A801A442", "vulnerable": true}, {"criteria": "cpe:2.3:a:adobe:acrobat:6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "4F8BB13E-2732-4F9E-A588-EA1C00893C8B", "vulnerable": true}, {"criteria": "cpe:2.3:a:adobe:acrobat:6.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "E5FCDCBF-597B-439C-8D8B-2819FC70C567", "vulnerable": true}, {"criteria": "cpe:2.3:a:adobe:acrobat:6.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "440B890A-90E9-4456-B92A-856CD17F0C78", "vulnerable": true}, {"criteria": "cpe:2.3:a:adobe:acrobat:6.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "79BD9D8D-39DA-403E-915D-E1B6A46A6BAB", "vulnerable": true}, {"criteria": "cpe:2.3:a:adobe:acrobat:6.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "8976A7DC-1314-4C4A-A7C5-AA789D2DAB9C", "vulnerable": true}, {"criteria": "cpe:2.3:a:adobe:acrobat:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "FECFC942-4F04-420C-A9B4-AE0C0590317F", "vulnerable": true}, {"criteria": "cpe:2.3:a:adobe:acrobat:7.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "F81817F2-1E3A-4A52-88F1-6B614A2A1F0A", "vulnerable": true}, {"criteria": "cpe:2.3:a:adobe:acrobat:7.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "CFFFFF0D-A80F-4B67-BEE2-86868EF7AA37", "vulnerable": true}, {"criteria": "cpe:2.3:a:adobe:acrobat:7.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "1DC97A87-2652-4AD6-8E10-419A9AC9C245", "vulnerable": true}, {"criteria": "cpe:2.3:a:adobe:acrobat:7.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E1F71AE-3591-499E-B09F-AAC4E38F1CF2", "vulnerable": true}, {"criteria": "cpe:2.3:a:adobe:acrobat:7.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "2D75174C-EBF9-4117-9E66-80E847012853", "vulnerable": true}, {"criteria": "cpe:2.3:a:adobe:acrobat:7.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "69B0305A-51D3-4E09-B96C-54B0ED921DA3", "vulnerable": true}, {"criteria": "cpe:2.3:a:adobe:acrobat:7.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "9762FE57-837B-4FFA-9813-AC038450EB2B", "vulnerable": true}, {"criteria": "cpe:2.3:a:adobe:acrobat:7.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "0055A38C-E421-40A1-8BC7-11856A20B8F0", "vulnerable": true}, {"criteria": "cpe:2.3:a:adobe:acrobat:7.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "758CC9EE-8929-405B-A845-83BAAECCB2AD", "vulnerable": true}, {"criteria": "cpe:2.3:a:adobe:acrobat:7.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "21AC1961-12F7-456F-9CE4-9AAF116CF141", "vulnerable": true}, {"criteria": "cpe:2.3:a:adobe:acrobat:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "26AE76F7-D7F6-4AF2-A5C6-708B5642C288", "vulnerable": true}, {"criteria": "cpe:2.3:a:adobe:acrobat:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "749FFB51-65D4-4A4B-95F3-742440276897", "vulnerable": true}, {"criteria": "cpe:2.3:a:adobe:acrobat:8.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "C8665E53-EC1E-4B95-9064-2565BC12113E", "vulnerable": true}, {"criteria": "cpe:2.3:a:adobe:acrobat:8.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "24218FDA-F9DA-465A-B5D5-76A55C7EE04E", "vulnerable": true}, {"criteria": "cpe:2.3:a:adobe:acrobat:8.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "E2C5F1C5-85CD-47B9-897F-E51D6902AF72", "vulnerable": true}, {"criteria": "cpe:2.3:a:adobe:acrobat:8.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "E0E190FF-3EBC-44AB-8072-4D964E843E8A", "vulnerable": true}, {"criteria": "cpe:2.3:a:adobe:acrobat:8.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "B95C0A99-42E4-40A9-BF61-507E4E4DC052", "vulnerable": true}, {"criteria": "cpe:2.3:a:adobe:acrobat:9:*:*:*:*:*:*:*", "matchCriteriaId": "37AF9870-B9F0-42D2-B2D1-4A7E569A4C73", "vulnerable": true}, {"criteria": "cpe:2.3:a:adobe:acrobat:9.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "5FF485FB-3317-4C89-B636-F22FF19B00BE", "vulnerable": true}, {"criteria": "cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*", "matchCriteriaId": "C7EC46E3-77B7-4455-B3E0-A45C6B69B3DC", "vulnerable": true}, {"criteria": "cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "4F475858-DCE2-4C93-A51A-04718DF17593", "vulnerable": true}, {"criteria": "cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "88687272-4CD0-42A2-B727-C322ABDE3549", "vulnerable": true}], "negate": false, "operator": "OR"}]}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*", "matchCriteriaId": "840D37C8-F30C-4A91-9B34-39AF1E4E34C8", "versionEndIncluding": "9.0", "vulnerable": true}, {"criteria": "cpe:2.3:a:adobe:reader:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "DA4A65AB-75F1-4F6B-83E4-354E7D1EAE3C", "vulnerable": true}, {"criteria": "cpe:2.3:a:adobe:reader:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "5AD49BF0-E8BC-4716-8B13-DF39267D9303", "vulnerable": true}, {"criteria": "cpe:2.3:a:adobe:reader:4.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "71FC1CDB-DF7C-45FF-973D-8C9310121B0C", "vulnerable": true}, {"criteria": "cpe:2.3:a:adobe:reader:4.0.5a:*:*:*:*:*:*:*", "matchCriteriaId": "5C8951B8-0DF2-48C9-9EAC-9EDCCD389958", "vulnerable": true}, {"criteria": "cpe:2.3:a:adobe:reader:4.0.5c:*:*:*:*:*:*:*", "matchCriteriaId": "DCCCF8E6-2117-4665-AC71-8F05771CDB15", "vulnerable": true}, {"criteria": "cpe:2.3:a:adobe:reader:4.5:*:*:*:*:*:*:*", "matchCriteriaId": "99E14042-AF3B-4609-8CFE-6E02B3DF5CF2", "vulnerable": true}, {"criteria": "cpe:2.3:a:adobe:reader:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "822D6CAA-4CF7-41BE-B2AC-E7CBAB6229C9", "vulnerable": true}, {"criteria": "cpe:2.3:a:adobe:reader:5.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "73579E5C-BDB2-4F9C-BB87-E3752B9030B7", "vulnerable": true}, {"criteria": "cpe:2.3:a:adobe:reader:5.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "8A57B3C8-B127-4A52-AB08-A1B6F7830914", "vulnerable": true}, {"criteria": "cpe:2.3:a:adobe:reader:5.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "F131F390-EA28-41C2-A054-42E6B070FA8E", "vulnerable": true}, {"criteria": "cpe:2.3:a:adobe:reader:5.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "E26DE5FE-729C-4C3A-80FB-0FAFC90A8BEB", "vulnerable": true}, {"criteria": "cpe:2.3:a:adobe:reader:5.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C85609BE-4385-4728-AC7E-4231B45A3CE1", "vulnerable": true}, {"criteria": "cpe:2.3:a:adobe:reader:5.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "29BDD58D-3200-48C1-AB30-07808E029061", "vulnerable": true}, {"criteria": "cpe:2.3:a:adobe:reader:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "FC93E153-9E21-4012-BFE0-0168488FFC17", "vulnerable": true}, {"criteria": "cpe:2.3:a:adobe:reader:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "30D445D4-2B00-451B-8744-CCA9F1E1ADA7", "vulnerable": true}, {"criteria": "cpe:2.3:a:adobe:reader:6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "53D60FEC-557F-456B-8F35-170078EC5C6F", "vulnerable": true}, {"criteria": "cpe:2.3:a:adobe:reader:6.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "51A7B617-FDB3-4F46-AF1F-F9210FB2793B", "vulnerable": true}, {"criteria": "cpe:2.3:a:adobe:reader:6.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "4B5D145B-FD5B-430E-8E90-929B00271C44", "vulnerable": true}, {"criteria": "cpe:2.3:a:adobe:reader:6.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "40E8FD46-14E2-4D92-8A99-66EC41F38CF7", "vulnerable": true}, {"criteria": "cpe:2.3:a:adobe:reader:6.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "78BA5B02-F565-4A7F-B9FD-DD08ABF258CE", "vulnerable": true}, {"criteria": "cpe:2.3:a:adobe:reader:7.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7E3F0A07-7021-4D04-A8F2-1BCAB474CD2A", "vulnerable": true}, {"criteria": "cpe:2.3:a:adobe:reader:7.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "B4C1C3A0-B0DF-42E4-A8AC-D93FCB6526D9", "vulnerable": true}, {"criteria": "cpe:2.3:a:adobe:reader:7.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "B3B5B11C-6E76-4A03-AC05-840EFE2F8504", "vulnerable": true}, {"criteria": "cpe:2.3:a:adobe:reader:7.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "CFF8D072-305A-40B9-9E89-D98BDD951346", "vulnerable": true}, {"criteria": "cpe:2.3:a:adobe:reader:7.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "DEF52FAE-B6EF-457D-A61A-95B5E31CEF7D", "vulnerable": true}, {"criteria": "cpe:2.3:a:adobe:reader:7.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "0A7236C5-85F8-47C5-8A24-D5282F94D77D", "vulnerable": true}, {"criteria": "cpe:2.3:a:adobe:reader:7.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "718F2E95-E221-4928-B50F-AB840BBA0E9F", "vulnerable": true}, {"criteria": "cpe:2.3:a:adobe:reader:7.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "123D2B4E-0D05-453C-B598-E41D43FE0E96", "vulnerable": true}, {"criteria": "cpe:2.3:a:adobe:reader:7.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "0109ADA4-6BA0-4299-8043-7CD60DAD6DD7", "vulnerable": true}, {"criteria": "cpe:2.3:a:adobe:reader:7.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "1F00A8EC-10FC-42B6-BB3E-985C903B91DC", "vulnerable": true}, {"criteria": "cpe:2.3:a:adobe:reader:8.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "98BCBFB5-72DF-4B8A-8F4C-E958B4FAFB37", "vulnerable": true}, {"criteria": "cpe:2.3:a:adobe:reader:8.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "71EB6E18-5764-4916-9ECA-F4E880672217", "vulnerable": true}, {"criteria": "cpe:2.3:a:adobe:reader:8.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "61151189-E24C-4AB6-BC60-B9AF720E3D4B", "vulnerable": true}, {"criteria": "cpe:2.3:a:adobe:reader:8.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "1B65F7E5-05A4-45FC-BDC2-670166535721", "vulnerable": true}, {"criteria": "cpe:2.3:a:adobe:reader:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "026B1CF8-28A2-415D-A240-C9DF774BF9DD", "vulnerable": true}, {"criteria": "cpe:2.3:a:adobe:reader:9.1:*:*:*:*:*:*:*", "matchCriteriaId": "FBE16943-CCD8-4A39-832F-F6ED3CF2936B", "vulnerable": true}, {"criteria": "cpe:2.3:a:adobe:reader:9.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "42A1A800-D0CC-4593-A31A-EE308E63B454", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "Heap-based buffer overflow in Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 allows remote attackers to execute arbitrary code via a crafted PDF file that triggers memory corruption, as exploited in the wild in October 2009. NOTE: some of these details are obtained from third party information."}, {"lang": "es", "value": "Un Desbordamiento de b\u00fafer en la regi\u00f3n heap de la memoria en Adobe Reader y Acrobat versi\u00f3n 7.x anterior a versi\u00f3n 7.1.4, versi\u00f3n 8.x anterior a 8.1.7, y versi\u00f3n 9.x anterior a 9.2, permite a los atacantes remotos ejecutar c\u00f3digo arbitrario por medio de un archivo PDF creado que desencadena la corrupci\u00f3n de memoria, tal y como fue explotado \"in the wild\" en octubre de 2009. NOTA: algunos de estos detalles se obtienen de informaci\u00f3n de terceros."}], "id": "CVE-2009-3459", "lastModified": "2025-04-09T00:30:58.490", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0"}, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true}]}, "published": "2009-10-13T10:30:00.577", "references": [{"source": "psirt@adobe.com", "tags": ["Vendor Advisory"], "url": "http://blogs.adobe.com/psirt/2009/10/adobe_reader_and_acrobat_issue_1.html"}, {"source": "psirt@adobe.com", "url": "http://isc.sans.org/diary.html?storyid=7300"}, {"source": "psirt@adobe.com", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/36983"}, {"source": "psirt@adobe.com", "url": "http://securitytracker.com/id?1023007"}, {"source": "psirt@adobe.com", "tags": ["Patch", "Vendor Advisory"], "url": "http://www.adobe.com/support/security/bulletins/apsb09-15.html"}, {"source": "psirt@adobe.com", "url": "http://www.iss.net/threats/348.html"}, {"source": "psirt@adobe.com", "url": "http://www.securityfocus.com/bid/36600"}, {"source": "psirt@adobe.com", "tags": ["US Government Resource"], "url": "http://www.us-cert.gov/cas/techalerts/TA09-286B.html"}, {"source": "psirt@adobe.com", "tags": ["Vendor Advisory"], "url": "http://www.vupen.com/english/advisories/2009/2851"}, {"source": "psirt@adobe.com", "tags": ["Vendor Advisory"], "url": "http://www.vupen.com/english/advisories/2009/2898"}, {"source": "psirt@adobe.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53691"}, {"source": "psirt@adobe.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6534"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://blogs.adobe.com/psirt/2009/10/adobe_reader_and_acrobat_issue_1.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://isc.sans.org/diary.html?storyid=7300"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/36983"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1023007"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch", "Vendor Advisory"], "url": "http://www.adobe.com/support/security/bulletins/apsb09-15.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.iss.net/threats/348.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/36600"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["US Government Resource"], "url": "http://www.us-cert.gov/cas/techalerts/TA09-286B.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://www.vupen.com/english/advisories/2009/2851"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://www.vupen.com/english/advisories/2009/2898"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53691"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6534"}], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-119"}], "source": "nvd@nist.gov", "type": "Primary"}]}