CVE-2009-1062

Adobe Acrobat Reader 9 before 9.1, 8 before 8.1.4, and 7 before 7.1.1 might allow remote attackers to trigger memory corruption and possibly execute arbitrary code via unknown attack vectors related to JBIG2, a different vulnerability than CVE-2009-0193 and CVE-2009-1061.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html
http://secunia.com/advisories/34392 Vendor Advisory
http://secunia.com/advisories/34490 Vendor Advisory
http://secunia.com/advisories/34706 Vendor Advisory
http://secunia.com/advisories/34790 Vendor Advisory
http://security.gentoo.org/glsa/glsa-200904-17.xml
http://sunsolve.sun.com/search/document.do?assetkey=1-66-256788-1
http://www.adobe.com/support/security/bulletins/apsb09-04.html Patch Vendor Advisory
http://www.ivizsecurity.com/security-advisory-iviz-sr-09001.html Patch
http://www.redhat.com/support/errata/RHSA-2009-0376.html
http://www.securityfocus.com/bid/34229 Patch
http://www.securitytracker.com/id?1021892
http://www.vupen.com/english/advisories/2009/1019 Vendor Advisory
http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html
http://secunia.com/advisories/34392 Vendor Advisory
http://secunia.com/advisories/34490 Vendor Advisory
http://secunia.com/advisories/34706 Vendor Advisory
http://secunia.com/advisories/34790 Vendor Advisory
http://security.gentoo.org/glsa/glsa-200904-17.xml
http://sunsolve.sun.com/search/document.do?assetkey=1-66-256788-1
http://www.adobe.com/support/security/bulletins/apsb09-04.html Patch Vendor Advisory
http://www.ivizsecurity.com/security-advisory-iviz-sr-09001.html Patch
http://www.redhat.com/support/errata/RHSA-2009-0376.html
http://www.securityfocus.com/bid/34229 Patch
http://www.securitytracker.com/id?1021892
http://www.vupen.com/english/advisories/2009/1019 Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:adobe:acrobat:*:*:professional:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:*:*:standard:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0:*:professional:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0:*:standard:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.1:*:professional:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.1:*:standard:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.2:*:professional:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.2:*:standard:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.3:*:professional:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.3:*:standard:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.4:*:professional:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.4:*:standard:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.5:*:professional:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.5:*:standard:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.6:*:professional:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.6:*:standard:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.7:*:professional:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.7:*:standard:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.8:*:professional:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.8:*:standard:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.9:*:professional:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.1:*:professional:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.1:*:standard:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.1.1:*:standard:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:8.0:*:professional:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:8.0:*:standard:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:8.1:*:standard:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:8.1.1:*:professional:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:8.1.1:*:standard:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:8.1.2:*:professional:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:8.1.2:*:standard:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:8.1.2:security_update:professional:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:8.1.3:*:professional:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:8.1.3:*:standard:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:8.1.4:*:professional:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:8.1.4:*:standard:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:7.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:reader:3.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:reader:4.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:reader:4.0.5:*:*:*:*:*:*:*
cpe:2.3:a:adobe:reader:4.0.5a:*:*:*:*:*:*:*
cpe:2.3:a:adobe:reader:4.0.5c:*:*:*:*:*:*:*
cpe:2.3:a:adobe:reader:4.5:*:*:*:*:*:*:*
cpe:2.3:a:adobe:reader:5.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:reader:5.0.5:*:*:*:*:*:*:*
cpe:2.3:a:adobe:reader:5.0.6:*:*:*:*:*:*:*
cpe:2.3:a:adobe:reader:5.0.7:*:*:*:*:*:*:*
cpe:2.3:a:adobe:reader:5.0.9:*:*:*:*:*:*:*
cpe:2.3:a:adobe:reader:5.0.10:*:*:*:*:*:*:*
cpe:2.3:a:adobe:reader:5.0.11:*:*:*:*:*:*:*
cpe:2.3:a:adobe:reader:5.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:reader:6.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:reader:6.0.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:reader:6.0.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:reader:6.0.3:*:*:*:*:*:*:*
cpe:2.3:a:adobe:reader:6.0.4:*:*:*:*:*:*:*
cpe:2.3:a:adobe:reader:6.0.5:*:*:*:*:*:*:*
cpe:2.3:a:adobe:reader:7.0.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:reader:7.0.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:reader:7.0.3:*:*:*:*:*:*:*
cpe:2.3:a:adobe:reader:7.0.5:*:*:*:*:*:*:*
cpe:2.3:a:adobe:reader:7.0.7:*:*:*:*:*:*:*
cpe:2.3:a:adobe:reader:7.0.8:*:*:*:*:*:*:*
cpe:2.3:a:adobe:reader:7.0.9:*:*:*:*:*:*:*
cpe:2.3:a:adobe:reader:7.1.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:reader:7.1.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:reader:8.1.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:reader:8.1.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:reader:8.1.4:*:*:*:*:*:*:*

History

No history.

Information

Published : 2009-03-25 01:30

Updated : 2025-04-09 00:30


NVD link : CVE-2009-1062

Mitre link : CVE-2009-1062

CVE.ORG link : CVE-2009-1062


JSON object : View

Products Affected

adobe

  • acrobat
  • reader
  • acrobat_reader
CWE
CWE-20

Improper Input Validation