5
CVSSv2

CVE-2009-3431

Published: 25/09/2009 Updated: 19/09/2017
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 505
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

Stack consumption vulnerability in Adobe Reader and Acrobat 9.1.3, 9.1.2, 9.1.1, and previous versions 9.x versions; 8.1.6 and previous versions 8.x versions; and possibly 7.1.4 and previous versions 7.x versions allows remote malicious users to cause a denial of service (application crash) via a PDF file with a large number of [ (open square bracket) characters in the argument to the alert method. NOTE: some of these details are obtained from third party information.

Vulnerable Product Search on Vulmon Subscribe to Product

adobe acrobat 7.0.2

adobe acrobat 7.0.5

adobe acrobat 7.0.8

adobe acrobat 7.1.0

adobe acrobat 7.1.1

adobe acrobat reader 8.0

adobe acrobat 8.1

adobe acrobat 8.1.1

adobe acrobat 8.1.2

adobe acrobat reader 8.1.3

adobe acrobat reader 8.1.4

adobe acrobat reader 9.1

adobe acrobat reader 7.0.1

adobe acrobat reader 7.0.8

adobe acrobat reader 7.0.9

adobe acrobat 7.1

adobe acrobat reader 7.0

adobe acrobat 7.0.1

adobe acrobat 7.0.4

adobe acrobat 7.0.6

adobe acrobat 7.0.7

adobe acrobat 7.0.9

adobe acrobat 7.0

adobe acrobat 9.0

adobe acrobat 9.0.0

adobe acrobat 8.1.3

adobe acrobat 8.1.4

adobe acrobat 9.1

adobe acrobat reader 8.1.1

adobe acrobat reader 8.1

adobe acrobat reader 7.0.4

adobe acrobat reader 7.0.5

adobe acrobat 8.0

adobe acrobat reader 9.1.1

adobe acrobat reader 8.1.2

adobe acrobat reader 7.1

adobe acrobat reader 7.0.6

adobe acrobat reader 7.0.7

adobe acrobat 7.0.3

adobe acrobat reader 9

adobe acrobat 9

adobe acrobat reader 8.1.5

adobe acrobat reader 7.0.2

adobe acrobat reader 7.0.3

adobe acrobat reader 7.1.1

adobe acrobat reader 9.1.3

adobe acrobat reader 9.1.2

Exploits

source: wwwsecurityfocuscom/bid/35148/info Adobe Acrobat is prone to a denial-of-service vulnerability because it fails to perform adequate boundary checks on user-supplied data Attackers can exploit this issue to cause the affected application to crash, effectively denying service Attackers may also be able to execute arbitrary code, ...