CVE-2008-2992
HIGH KEV RANSOMWAREAdobe Acrobat < 8.1.2 - Out-of-Bounds Write
Title source: ruleDescription
Stack-based buffer overflow in Adobe Acrobat and Reader 8.1.2 and earlier allows remote attackers to execute arbitrary code via a PDF file that calls the util.printf JavaScript function with a crafted format string argument, a related issue to CVE-2008-1104.
Exploits (6)
metasploit
WORKING POC
GOOD
by MC · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/fileformat/adobe_utilprintf.rb
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubylocalwindows
https://www.exploit-db.com/exploits/16624
exploitdb
WORKING POC
VERIFIED
by Debasis Mohanty · textlocalwindows
https://www.exploit-db.com/exploits/7006
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubylocalwindows
https://www.exploit-db.com/exploits/16504
metasploit
WORKING POC
GOOD
by MC · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/browser/adobe_utilprintf.rb
exploitdb
WORKING POC
VERIFIED
by Elazar · textlocalwindows
https://www.exploit-db.com/exploits/6994
References (28)
Scores
CVSS v3
7.8
EPSS
0.9374
EPSS Percentile
99.8%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Exploitation Intel
CISA KEV
2022-03-03
VulnCheck KEV
2010-01-20
InTheWild.io
2022-03-03
ENISA EUVD
EUVD-2008-2982
Ransomware Use
Confirmed
Classification
CWE
CWE-787
Status
draft
Affected Products (3)
adobe/acrobat
< 8.1.2
adobe/acrobat_reader
< 8.1.2
oracle/solaris
Timeline
Published
Nov 04, 2008
KEV Added
Mar 03, 2022
Tracked Since
Feb 18, 2026