Professional OVAL Repository
[Eng]
[Rus]
[Sign-In]
OVAL
Search
Categories
RedCheck
About
OVAL Definitions
OVAL Items
FSTEC Data Bank Information Security Threats
NKCKI
EOL (End Of Life)
Linux Security Advisories
Mozilla Foundation Security Advisory
IBM
VMware
Cisco
Check Point Software Technologies
Apache
Solaris
FreeBSD
Development
GitHub Enterprise
Google Chrome Security Advisories
Oracle Security Advisories
Adobe Security Advisories
OpenSSL Security Advisories
Microsoft
CVE
CWE
CPE
Latest Updates
OS ROSA
ALT Linux
Astra Linux SE 1.5
Astra Linux SE 1.6
RED OS
DSA (Debian Security Advisory) Patсh Statistics
DSA (Debian Security Advisory) Patсh Feed
DSA (Debian Security Advisory) Vulnerability Feed
DLA (Debian Security Advisory) Patсh Statistics
DLA (Debian Security Advisory) Patсh Feed
DLA (Debian Security Advisory) Vulnerability Feed
ALT Linux (Security Bulletins) Patсh Statistics
ALT Linux (Security Bulletins) Patсh Feed
ALT Linux (Security Bulletins) Vulnerability Feed
RED OS (Security Bulletins) Patсh Statistics
RED OS (Security Bulletins) Patсh Feed
RED OS (Security Bulletins) Vulnerability Feed
USN (Ubuntu Security Notice) Patсh Statistics
USN (Ubuntu Security Notice) Patсh Feed
USN (Ubuntu Security Notice) Vulnerability Feed
RHSA (RedHat Security Advisory) Patсh Statistics
RHSA (RedHat Security Advisory) Patсh Feed
RHSA (RedHat Security Advisory) Vulnerability Feed
ELSA (Oracle Linux Security Advisory) Patсh Statistics
ELSA (Oracle Linux Security Advisory) Patсh Feed
ELSA (Oracle Linux Security Advisory) Vulnerability Feed
SUSE (SUSE Security Advisories) Patсh Statistics
SUSE (SUSE Security Advisories) Patсh Feed
SUSE (SUSE Security Advisories) Vulnerability Feed
openSUSE (openSUSE Security Advisories) Patсh Statistics
openSUSE (openSUSE Security Advisories) Patсh Feed
openSUSE (openSUSE Security Advisories) Vulnerability Feed
Amazon Linux AMI (Security Bulletins) Patсh Statistics
Amazon Linux AMI (Security Bulletins) Patсh Feed
Amazon Linux AMI (Security Bulletins) Vulnerability Feed
Mageia Linux (Security Bulletins) Patсh Statistics
Mageia Linux (Security Bulletins) Patсh Feed
Mageia Linux (Security Bulletins) Vulnerability Feed
OS ROSA SX COBALT 1.0
OS ROSA DX COBALT 1.0
ROSA 7.3 (Security Advisories) Patсh Statistics
ROSA 7.3 (Security Advisories) Patсh Feed
ROSA 7.3 (Security Advisories) Vulnerability Feed
ALT Linux SPT 6.0
ALT Linux SPT 7.0
ALT 8 SP
ALT 9
RED OS Murom 7.1
RED OS Murom 7.2
IBM DB2
VMware Vulnerabilities Advisory (VMSA)
VMware vCenter Patch Advisories
VMware ESXi Patch Advisories
VMware NSX Patches
VMware NSX Vulnerabilities
VMware Photon OS 1.0 Patches
VMware Photon OS 1.0 Vulnerabilities
VMware Photon OS 2.0 Patches
VMware Photon OS 2.0 Vulnerabilities
Cisco ASA
Cisco IOS/NX-OS Advisory
Cisco NX-OS Vulnerabilities
Check Point Gaia
Apache Tomcat Advisories
Apache Tomcat Server
Apache HTTP Server
Python
Node.js
RubyGems
Qt
Microsoft Security Bulletin
Microsoft Knowledge Base Article
Microsoft SharePoint
Microsoft SharePoint Foundation 2013
Microsoft SharePoint Server 2013
Microsoft SharePoint Server 2016
About OVALdb
User manual
Pricing
Contact us
OVAL Definitions
>
OVAL Definition Details
Id
oval:com.altx-soft.nix:def:8388
[Rus]
Version
4
Class
patch
ALTXid
74877
Language
English
Severity
Critical
Title
RHSA-2009:1499 -- acroread security update
Description
Updated acroread packages that fix multiple security issues are now
available for Red Hat Enterprise Linux 3 Extras, Red Hat Enterprise Linux 4
Extras, and Red Hat Enterprise Linux 5 Supplementary.
Family
unix
Platform
Red Hat Enterprise Linux 5
Product
acroread
Reference
VENDOR: RHSA-2009:1499
VENDOR: RHSA-2009:1499
Id:
RHSA-2009:1499
Reference:
https://rhn.redhat.com/errata/RHSA-2009-1499.html
CVE: CVE-2009-2979
CVE: CVE-2009-2979
Id:
CVE-2009-2979
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2979
Comment
: Adobe Reader and Acrobat 9.x before 9.2, 8.x before 8.1.7, and possibly 7.x through 7.1.4 do not properly perform XMP-XML entity expansion, which allows remote attackers to cause a denial of service via a crafted document.
CVSSv2 Score:
4.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:N/I:N/A:P
CWE:
CWE-Other ()
References:
1023007 (SECTRACK)
http://www.adobe.com/support/security/bulletins/apsb09-15.html (CONFIRM)
36638 (BID)
TA09-286B (CERT)
ADV-2009-2898 (VUPEN)
oval:org.mitre.oval:def:6280 (OVAL)
CVE: CVE-2009-2980
CVE: CVE-2009-2980
Id:
CVE-2009-2980
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2980
Comment
: Integer overflow in Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 allows attackers to cause a denial of service or possibly execute arbitrary code via unspecified vectors.
CVSSv2 Score:
9.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C
CWE:
189 (Numeric Errors)
References:
1023007 (SECTRACK)
http://www.adobe.com/support/security/bulletins/apsb09-15.html (CONFIRM)
36638 (BID)
TA09-286B (CERT)
ADV-2009-2898 (VUPEN)
oval:org.mitre.oval:def:5964 (OVAL)
CVE: CVE-2009-2981
CVE: CVE-2009-2981
Id:
CVE-2009-2981
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2981
Comment
: Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 do not properly validate input, which might allow attackers to bypass intended Trust Manager restrictions via unspecified vectors.
CVSSv2 Score:
9.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C
CWE:
20 (Improper Input Validation)
References:
1023007 (SECTRACK)
http://www.adobe.com/support/security/bulletins/apsb09-15.html (CONFIRM)
36638 (BID)
TA09-286B (CERT)
ADV-2009-2898 (VUPEN)
oval:org.mitre.oval:def:6284 (OVAL)
CVE: CVE-2009-2983
CVE: CVE-2009-2983
Id:
CVE-2009-2983
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2983
Comment
: Adobe Reader and Acrobat 9.x before 9.2, 8.x before 8.1.7, and possibly 7.x through 7.1.4 allow attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors.
CVSSv2 Score:
9.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C
CWE:
399 (Resource Management Errors)
References:
1023007 (SECTRACK)
http://www.adobe.com/support/security/bulletins/apsb09-15.html (CONFIRM)
36638 (BID)
TA09-286B (CERT)
ADV-2009-2898 (VUPEN)
oval:org.mitre.oval:def:5636 (OVAL)
CVE: CVE-2009-2985
CVE: CVE-2009-2985
Id:
CVE-2009-2985
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2985
Comment
: Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 allow attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2009-2996.
CVSSv2 Score:
9.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C
CWE:
399 (Resource Management Errors)
References:
1023007 (SECTRACK)
http://www.adobe.com/support/security/bulletins/apsb09-15.html (CONFIRM)
36638 (BID)
TA09-286B (CERT)
ADV-2009-2898 (VUPEN)
oval:org.mitre.oval:def:6145 (OVAL)
CVE: CVE-2009-2986
CVE: CVE-2009-2986
Id:
CVE-2009-2986
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2986
Comment
: Multiple heap-based buffer overflows in Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 might allow attackers to execute arbitrary code via unspecified vectors.
CVSSv2 Score:
9.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C
CWE:
119 (Improper Restriction of Operations within the Bounds of a Memory Buffer)
References:
1023007 (SECTRACK)
http://www.adobe.com/support/security/bulletins/apsb09-15.html (CONFIRM)
36638 (BID)
TA09-286B (CERT)
ADV-2009-2898 (VUPEN)
oval:org.mitre.oval:def:5888 (OVAL)
CVE: CVE-2009-2988
CVE: CVE-2009-2988
Id:
CVE-2009-2988
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2988
Comment
: Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 do not properly validate input, which allows attackers to cause a denial of service via unspecified vectors.
CVSSv2 Score:
4.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:N/I:N/A:P
CWE:
20 (Improper Input Validation)
References:
1023007 (SECTRACK)
http://www.adobe.com/support/security/bulletins/apsb09-15.html (CONFIRM)
36638 (BID)
TA09-286B (CERT)
ADV-2009-2898 (VUPEN)
oval:org.mitre.oval:def:6483 (OVAL)
CVE: CVE-2009-2990
CVE: CVE-2009-2990
Id:
CVE-2009-2990
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2990
Comment
: Array index error in Adobe Reader and Acrobat 9.x before 9.2, 8.x before 8.1.7, and possibly 7.x through 7.1.4 might allow attackers to execute arbitrary code via unspecified vectors.
CVSSv2 Score:
9.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C
CWE:
189 (Numeric Errors)
References:
1023007 (SECTRACK)
http://www.adobe.com/support/security/bulletins/apsb09-15.html (CONFIRM)
36638 (BID)
TA09-286B (CERT)
ADV-2009-2898 (VUPEN)
oval:org.mitre.oval:def:6371 (OVAL)
CVE: CVE-2009-2991
CVE: CVE-2009-2991
Id:
CVE-2009-2991
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2991
Comment
: Unspecified vulnerability in the Mozilla plug-in in Adobe Reader and Acrobat 8.x before 8.1.7, and possibly 7.x before 7.1.4 and 9.x before 9.2, might allow remote attackers to execute arbitrary code via unknown vectors.
CVSSv2 Score:
9.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C
References:
1023007 (SECTRACK)
http://www.adobe.com/support/security/bulletins/apsb09-15.html (CONFIRM)
36638 (BID)
TA09-286B (CERT)
ADV-2009-2898 (VUPEN)
oval:org.mitre.oval:def:5557 (OVAL)
CVE: CVE-2009-2993
CVE: CVE-2009-2993
Id:
CVE-2009-2993
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2993
Comment
: The JavaScript for Acrobat API in Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 does not properly implement the (1) Privileged Context and (2) Safe Path restrictions for unspecified JavaScript methods, which allows remote attackers to create arbitrary files, and possibly execute arbitrary code, via the cPath parameter in a crafted PDF file. NOTE: some of these details are obtained from third party information.
CVSSv2 Score:
9.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C
CWE:
20 (Improper Input Validation)
References:
1023007 (SECTRACK)
http://www.adobe.com/support/security/bulletins/apsb09-15.html (CONFIRM)
VU#257117 (CERT-VN)
36638 (BID)
36664 (BID)
TA09-286B (CERT)
ADV-2009-2898 (VUPEN)
oval:org.mitre.oval:def:5822 (OVAL)
CVE: CVE-2009-2994
CVE: CVE-2009-2994
Id:
CVE-2009-2994
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2994
Comment
: Buffer overflow in Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 might allow attackers to execute arbitrary code via unspecified vectors.
CVSSv2 Score:
9.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C
CWE:
119 (Improper Restriction of Operations within the Bounds of a Memory Buffer)
References:
1023007 (SECTRACK)
http://www.adobe.com/support/security/bulletins/apsb09-15.html (CONFIRM)
36638 (BID)
TA09-286B (CERT)
ADV-2009-2898 (VUPEN)
oval:org.mitre.oval:def:6156 (OVAL)
CVE: CVE-2009-2996
CVE: CVE-2009-2996
Id:
CVE-2009-2996
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2996
Comment
: Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 allow attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2009-2985.
CVSSv2 Score:
9.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C
CWE:
399 (Resource Management Errors)
References:
1023007 (SECTRACK)
http://www.adobe.com/support/security/bulletins/apsb09-15.html (CONFIRM)
36638 (BID)
TA09-286B (CERT)
ADV-2009-2898 (VUPEN)
oval:org.mitre.oval:def:5560 (OVAL)
CVE: CVE-2009-2997
CVE: CVE-2009-2997
Id:
CVE-2009-2997
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2997
Comment
: Heap-based buffer overflow in Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 might allow attackers to execute arbitrary code via unspecified vectors.
CVSSv2 Score:
9.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C
CWE:
119 (Improper Restriction of Operations within the Bounds of a Memory Buffer)
References:
1023007 (SECTRACK)
http://www.adobe.com/support/security/bulletins/apsb09-15.html (CONFIRM)
36638 (BID)
TA09-286B (CERT)
ADV-2009-2898 (VUPEN)
oval:org.mitre.oval:def:6481 (OVAL)
CVE: CVE-2009-2998
CVE: CVE-2009-2998
Id:
CVE-2009-2998
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2998
Comment
: Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 do not properly validate input, which might allow attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2009-3458.
CVSSv2 Score:
9.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C
CWE:
20 (Improper Input Validation)
References:
1023007 (SECTRACK)
http://www.adobe.com/support/security/bulletins/apsb09-15.html (CONFIRM)
36638 (BID)
TA09-286B (CERT)
ADV-2009-2898 (VUPEN)
oval:org.mitre.oval:def:6418 (OVAL)
CVE: CVE-2009-3431
CVE: CVE-2009-3431
Id:
CVE-2009-3431
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3431
Comment
: Stack consumption vulnerability in Adobe Reader and Acrobat 9.1.3, 9.1.2, 9.1.1, and earlier 9.x versions; 8.1.6 and earlier 8.x versions; and possibly 7.1.4 and earlier 7.x versions allows remote attackers to cause a denial of service (application crash) via a PDF file with a large number of [ (open square bracket) characters in the argument to the alert method. NOTE: some of these details are obtained from third party information.
CVSSv2 Score:
5
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P
CWE:
119 (Improper Restriction of Operations within the Bounds of a Memory Buffer)
References:
1023007 (SECTRACK)
http://www.adobe.com/support/security/bulletins/apsb09-15.html (CONFIRM)
35148 (BID)
TA09-286B (CERT)
ADV-2009-2898 (VUPEN)
oval:org.mitre.oval:def:6532 (OVAL)
CVE: CVE-2009-3458
CVE: CVE-2009-3458
Id:
CVE-2009-3458
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3458
Comment
: Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 do not properly validate input, which might allow attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2009-2998.
CVSSv2 Score:
9.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C
CWE:
20 (Improper Input Validation)
References:
1023007 (SECTRACK)
http://www.adobe.com/support/security/bulletins/apsb09-15.html (CONFIRM)
36638 (BID)
TA09-286B (CERT)
ADV-2009-2898 (VUPEN)
oval:org.mitre.oval:def:6499 (OVAL)
CVE: CVE-2009-3459
CVE: CVE-2009-3459
Id:
CVE-2009-3459
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3459
Comment
: Heap-based buffer overflow in Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 allows remote attackers to execute arbitrary code via a crafted PDF file that triggers memory corruption, as exploited in the wild in October 2009. NOTE: some of these details are obtained from third party information.
CVSSv2 Score:
9.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C
CWE:
119 (Improper Restriction of Operations within the Bounds of a Memory Buffer)
References:
http://blogs.adobe.com/psirt/2009/10/adobe_reader_and_acrobat_issue_1.html (CONFIRM)
http://isc.sans.org/diary.html?storyid=7300 (MISC)
36983 (SECUNIA)
1023007 (SECTRACK)
http://www.adobe.com/support/security/bulletins/apsb09-15.html (CONFIRM)
20091009 Adobe Acrobat and Acrobat Reader Remote Code Execution (ISS)
36600 (BID)
TA09-286B (CERT)
ADV-2009-2851 (VUPEN)
ADV-2009-2898 (VUPEN)
adobe-reader-pdf-code-execution(53691) (XF)
oval:org.mitre.oval:def:6534 (OVAL)
CVE: CVE-2009-3462
CVE: CVE-2009-3462
Id:
CVE-2009-3462
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3462
Comment
: Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 on Unix, when Debug mode is enabled, allow attackers to execute arbitrary code via unspecified vectors, related to a "format bug."
CVSSv2 Score:
5.1
Access vector:
NETWORK
Access complexity:
HIGH
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:H/Au:N/C:P/I:P/A:P
CWE:
CWE-Other ()
References:
1023007 (SECTRACK)
http://www.adobe.com/support/security/bulletins/apsb09-15.html (CONFIRM)
36638 (BID)
TA09-286B (CERT)
ADV-2009-2898 (VUPEN)
oval:org.mitre.oval:def:6429 (OVAL)
Content available only for registered users!
ovaldb@altx-soft.com