First published: Thu Apr 30 2009(Updated: )
The customDictionaryOpen spell method in the JavaScript API in Adobe Reader 9.1, 8.1.4, 7.1.1, and earlier on Linux and UNIX allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a PDF file that triggers a call to this method with a long string in the second argument.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Adobe Acrobat Reader | =8.1.4 | |
Adobe Acrobat Reader | =9.1 | |
Linux Linux | ||
All of | ||
Any of | ||
Adobe Acrobat Reader | =8.1.4 | |
Adobe Acrobat Reader | =9.1 | |
Linux Kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-1493 is classified as a medium severity vulnerability that can lead to denial of service or arbitrary code execution.
To fix CVE-2009-1493, users should upgrade to the latest version of Adobe Reader that addresses this vulnerability.
CVE-2009-1493 affects Adobe Reader versions 7.1.1, 8.1.4, and 9.1 on Linux and UNIX systems.
CVE-2009-1493 allows remote attackers to perform a denial of service attack or potentially execute arbitrary code via specially crafted PDF files.
No, CVE-2009-1493 is not present in later versions of Adobe Reader that have been patched after version 9.1.