CVE-2009-2993Improper Input Validation in Adobe Acrobat

Severity
9.3CRITICALNVD
EPSS
6.3%
top 8.99%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 19
Latest updateMay 2

Description

The JavaScript for Acrobat API in Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 does not properly implement the (1) Privileged Context and (2) Safe Path restrictions for unspecified JavaScript methods, which allows remote attackers to create arbitrary files, and possibly execute arbitrary code, via the cPath parameter in a crafted PDF file. NOTE: some of these details are obtained from third party information.

CVSS vector

AV:N/AC:M/C:C/I:C/A:CExploitability: 8.6 | Impact: 10.0

Affected Packages2 packages

NVDadobe/acrobat_reader9.1.3+25
NVDadobe/acrobat9.1.3+23

Patches

🔴Vulnerability Details

1
GHSA
GHSA-q9x2-fv97-cmpm: The JavaScript for Acrobat API in Adobe Reader and Acrobat 72022-05-02

📋Vendor Advisories

1
Red Hat
acroread: Multiple arbitrary code execution fixes in 8.1.7 (APSB09-15)2009-10-13

💬Community

1
Bugzilla
acroread: Multiple arbitrary code execution fixes in 8.1.7 (APSB09-15)2009-10-13
CVE-2009-2993 — Improper Input Validation in Adobe | cvebase