Description
Stack consumption vulnerability in Adobe Reader and Acrobat 9.1.3, 9.1.2, 9.1.1, and earlier 9.x versions; 8.1.6 and earlier 8.x versions; and possibly 7.1.4 and earlier 7.x versions allows remote attackers to cause a denial of service (application crash) via a PDF file with a large number of [ (open square bracket) characters in the argument to the alert method. NOTE: some of these details are obtained from third party information.
Exploits (1)
exploitdb
WRITEUP
VERIFIED
by Saint Patrick · textdoslinux
https://www.exploit-db.com/exploits/33017
References (6)
Core 6
Core References
Various Sources x_refsource_confirm
http://www.adobe.com/support/security/bulletins/apsb09-15.html
US Government Resource third-party-advisory
x_refsource_cert
http://www.us-cert.gov/cas/techalerts/TA09-286B.html
Third Party Advisory, VDB Entry vdb-entry
x_refsource_sectrack
http://securitytracker.com/id?1023007
Third Party Advisory, VDB Entry vdb-entry
signature
x_refsource_oval
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6532
Vendor Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2009/2898
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/35148
Scores
EPSS
0.2186
EPSS Percentile
95.8%
Details
CWE
CWE-119
Status
published
Products (18)
adobe/acrobat
7.0 (3 CPE variants)
adobe/acrobat
7.0.1 (3 CPE variants)
adobe/acrobat
7.0.2 (3 CPE variants)
adobe/acrobat
7.0.3 (3 CPE variants)
adobe/acrobat
7.0.4 (3 CPE variants)
adobe/acrobat
7.0.5 (3 CPE variants)
adobe/acrobat
7.0.6 (3 CPE variants)
adobe/acrobat
7.0.7 (3 CPE variants)
adobe/acrobat
7.0.8 (4 CPE variants)
adobe/acrobat
7.0.9 (2 CPE variants)
... and 8 more
Published
Sep 25, 2009
Tracked Since
Feb 18, 2026