CVE-2008-2992

HIGH KEV RANSOMWARE

Adobe Acrobat < 8.1.2 - Out-of-Bounds Write

Title source: rule

Description

Stack-based buffer overflow in Adobe Acrobat and Reader 8.1.2 and earlier allows remote attackers to execute arbitrary code via a PDF file that calls the util.printf JavaScript function with a crafted format string argument, a related issue to CVE-2008-1104.

Exploits (6)

metasploit WORKING POC GOOD
by MC · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/fileformat/adobe_utilprintf.rb
exploitdb WORKING POC VERIFIED
by Metasploit · rubylocalwindows
https://www.exploit-db.com/exploits/16624
exploitdb WORKING POC VERIFIED
by Debasis Mohanty · textlocalwindows
https://www.exploit-db.com/exploits/7006
exploitdb WORKING POC VERIFIED
by Metasploit · rubylocalwindows
https://www.exploit-db.com/exploits/16504
metasploit WORKING POC GOOD
by MC · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/browser/adobe_utilprintf.rb
exploitdb WORKING POC VERIFIED
by Elazar · textlocalwindows
https://www.exploit-db.com/exploits/6994

References (28)

... and 8 more

Scores

CVSS v3 7.8
EPSS 0.9374
EPSS Percentile 99.8%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Exploitation Intel

CISA KEV 2022-03-03
VulnCheck KEV 2010-01-20
InTheWild.io 2022-03-03
ENISA EUVD EUVD-2008-2982
Ransomware Use Confirmed

Classification

CWE
CWE-787
Status draft

Affected Products (3)

adobe/acrobat < 8.1.2
adobe/acrobat_reader < 8.1.2
oracle/solaris

Timeline

Published Nov 04, 2008
KEV Added Mar 03, 2022
Tracked Since Feb 18, 2026