| Title | Adobe Acrobat における任意のコードを実行される脆弱性 |
|---|---|
| Summary | Adobe Acrobat には、任意のコードを実行される脆弱性が存在します。 |
| Possible impacts | 攻撃者により、任意のコードを実行される可能性があります。 |
| Solution | ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。 |
| Publication Date | Oct. 13, 2009, midnight |
| Registration Date | Feb. 9, 2010, 1:55 p.m. |
| Last Update | Feb. 9, 2010, 1:55 p.m. |
| CVSS2.0 : 危険 | |
| Score | 9.3 |
|---|---|
| Vector | AV:N/AC:M/Au:N/C:C/I:C/A:C |
| サン・マイクロシステムズ |
| Sun Solaris 10 (sparc) |
| アドビシステムズ |
| Adobe Acrobat 7.1.3 およびそれ以前 |
| Adobe Acrobat 8.1.6 およびそれ以前 |
| Adobe Acrobat 9.1.3 およびそれ以前 |
| No | Changed Details | Date of change |
|---|---|---|
| 0 | [2010年02月09日] 掲載 |
Feb. 17, 2018, 10:37 a.m. |
| Summary | Integer overflow in Adobe Acrobat 9.x before 9.2, 8.x before 8.1.7, and possibly 7.x through 7.1.4 might allow attackers to execute arbitrary code via unspecified vectors. |
|---|---|
| Summary | Per: http://www.adobe.com/support/security/bulletins/apsb09-15.html This update resolves an integer overflow that could potentially lead to code execution. This issue is specific to Acrobat and does not affect Adobe Reader. (CVE-2009-2989). |
| Summary | Per: http://www.adobe.com/support/security/bulletins/apsb09-15.html Solution Acrobat Acrobat Standard and Pro users on Windows can find the appropriate update here: Acrobat Pro Extended users on Windows can find the appropriate update here: http://www.adobe.com/support/downloads/product.jsp?product=158&platform=Windows Acrobat 3D users on Windows can find the appropriate update here: Acrobat Pro users on Macintosh can find the appropriate update here: |
| Publication Date | Oct. 20, 2009, 7:30 a.m. |
| Registration Date | Jan. 29, 2021, 1:22 p.m. |
| Last Update | Oct. 31, 2018, 1:25 a.m. |
| Configuration1 | or higher | or less | more than | less than | |
| cpe:2.3:a:adobe:acrobat:7.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat:7.0.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat:7.0.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat:7.0.3:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat:7.0.4:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat:7.0.5:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat:7.0.6:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat:7.0.7:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat:7.0.8:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat:7.0.9:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat:7.1.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat:7.1.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat:7.1.3:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat:8.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat:8.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat:8.1.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat:8.1.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat:8.1.3:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat:8.1.4:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat:8.1.6:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:* | 9.1.3 | ||||