First published: Thu Apr 30 2009(Updated: )
The getAnnots Doc method in the JavaScript API in Adobe Reader and Acrobat 9.1, 8.1.4, 7.1.1, and earlier allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a PDF file that contains an annotation, and has an OpenAction entry with JavaScript code that calls this method with crafted integer arguments.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Adobe Acrobat Reader | >=7.0<=7.1.1 | |
Adobe Acrobat Reader | >=8.0<=8.1.4 | |
Adobe Acrobat Reader | >=9.0<=9.1 | |
Adobe Acrobat Reader Notification Manager | >=7.0<=7.1.1 | |
Adobe Acrobat Reader Notification Manager | >=8.0<=8.1.4 | |
Adobe Acrobat Reader Notification Manager | >=9.0<=9.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-1492 has a high severity rating due to its potential for remote code execution and denial of service.
To mitigate CVE-2009-1492, users should update Adobe Reader and Acrobat to the latest versions that address this vulnerability.
CVE-2009-1492 affects Adobe Reader and Acrobat versions 7.1.1, 8.1.4, and 9.1, as well as earlier versions.
CVE-2009-1492 can allow attackers to execute arbitrary code or cause denial of service through specially crafted PDF files.
While CVE-2009-1492 was discovered in 2009, users of affected versions are still at risk if they haven't updated their software.