| Summary | The default configuration of Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, does not enable the Enhanced Security feature, which has unspecified impact and attack vectors, related to a "script injection vulnerability," as demonstrated by Acrobat Forms Data Format (FDF) behavior that allows cross-site scripting (XSS) by user-assisted remote attackers. |
|---|---|
| Summary | Per: http://www.adobe.com/support/security/bulletins/apsb10-02.html Affected software versions Adobe Reader 9.2 and earlier versions for Windows, Macintosh, and UNIX |
| Summary | Per: http://www.adobe.com/support/security/bulletins/apsb10-02.html a script injection vulnerability by changing the Enhanced Security default (CVE-2009-3956). |
| Publication Date | Jan. 14, 2010, 4:30 a.m. |
| Registration Date | Jan. 29, 2021, 1:25 p.m. |
| Last Update | Oct. 31, 2018, 1:25 a.m. |
| CVSS2.0 : HIGH | |
| Score | 10.0 |
|---|---|
| Vector | AV:N/AC:L/Au:N/C:C/I:C/A:C |
| 攻撃元区分(AV) | ネットワーク |
| 攻撃条件の複雑さ(AC) | 低 |
| 攻撃前の認証要否(Au) | 不要 |
| 機密性への影響(C) | 高 |
| 完全性への影響(I) | 高 |
| 可用性への影響(A) | 高 |
| Get all privileges. | いいえ |
| Get user privileges | いいえ |
| Get other privileges | いいえ |
| User operation required | いいえ |
| Configuration1 | or higher | or less | more than | less than | |
| cpe:2.3:a:adobe:acrobat:3.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat:3.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat:4.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat:4.0.5:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat:4.0.5a:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat:4.0.5c:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat:5.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat:5.0.5:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat:5.0.6:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat:5.0.10:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat:6.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat:6.0.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat:6.0.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat:6.0.3:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat:6.0.4:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat:6.0.5:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat:6.0.6:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat:7.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat:7.0.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat:7.0.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat:7.0.3:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat:7.0.4:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat:7.0.5:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat:7.0.6:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat:7.0.7:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat:7.0.8:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat:7.0.9:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat:7.1.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat:7.1.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat:7.1.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat:7.1.3:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat:7.1.4:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat:8.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat:8.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat:8.1.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat:8.1.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat:8.1.3:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat:8.1.4:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat:8.1.5:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat:8.1.6:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat:8.1.7:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat:9.1.3:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:* | 9.2 | ||||
| execution environment | |||||
| 1 | cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:* | ||||
| 2 | cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:* | ||||
| Configuration2 | or higher | or less | more than | less than | |
| cpe:2.3:a:adobe:acrobat_reader:3.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat_reader:3.01:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat_reader:3.02:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat_reader:4.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat_reader:4.0.5:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat_reader:4.0.5a:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat_reader:4.0.5c:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat_reader:4.5:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat_reader:5.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat_reader:5.0.5:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat_reader:5.0.6:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat_reader:5.0.7:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat_reader:5.0.9:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat_reader:5.0.10:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat_reader:5.0.11:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat_reader:5.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat_reader:6.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat_reader:6.0.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat_reader:6.0.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat_reader:6.0.3:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat_reader:6.0.4:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat_reader:6.0.5:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat_reader:7.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat_reader:7.0.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat_reader:7.0.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat_reader:7.0.3:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat_reader:7.0.4:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat_reader:7.0.5:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat_reader:7.0.6:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat_reader:7.0.7:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat_reader:7.0.8:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat_reader:7.0.9:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat_reader:7.1.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat_reader:7.1.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat_reader:7.1.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat_reader:7.1.3:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat_reader:8.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat_reader:8.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat_reader:8.1.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat_reader:8.1.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat_reader:8.1.4:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat_reader:8.1.5:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat_reader:8.1.6:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat_reader:8.1.7:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat_reader:9.1.3:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:* | 9.2 | ||||
| execution environment | |||||
| 1 | cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:* | ||||
| 2 | cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:* | ||||
| 3 | cpe:2.3:o:unix:unix:*:*:*:*:*:*:*:* | ||||
| Title | Adobe Reader および Acrobat におけるスクリプトインジェクションの脆弱性に関連した脆弱性 |
|---|---|
| Summary | Microsoft Windows および Apple Mac OS X 上で稼動する Adobe Reader および Acrobat のデフォルト設定には、拡張セキュリティ機能を適切にサポートしないため、スクリプトインジェクションの脆弱性に関連した影響および攻撃の脆弱性が存在します。 |
| Possible impacts | スクリプトインジェクションの脆弱性に関連した影響および攻撃の可能性があります。 |
| Solution | ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。 |
| Publication Date | Jan. 12, 2010, midnight |
| Registration Date | Feb. 10, 2010, 1:39 p.m. |
| Last Update | Feb. 10, 2010, 1:39 p.m. |
| レッドハット |
| Red Hat Enterprise Linux Extras 3 extras |
| Red Hat Enterprise Linux Extras 4 extras |
| Red Hat Enterprise Linux Extras 4.8.z extras |
| RHEL Desktop Supplementary 5 (client) |
| RHEL Supplementary 5 (server) |
| RHEL Supplementary EUS 5.4.z (server) |
| アドビシステムズ |
| Adobe Acrobat 8.2 未満 |
| Adobe Acrobat 9.3 未満 |
| Adobe Reader 8.2 未満 |
| Adobe Reader 9.3 未満 |
| No | Changed Details | Date of change |
|---|---|---|
| 0 | [2010年02月10日] 掲載 |
Feb. 17, 2018, 10:37 a.m. |