mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-06 02:31:38 +00:00
23 lines
1.0 KiB
Markdown
23 lines
1.0 KiB
Markdown
![]() |
### [CVE-2009-4324](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4324)
|
||
|

|
||
|

|
||
|

|
||
|
|
||
|
### Description
|
||
|
|
||
|
Use-after-free vulnerability in the Doc.media.newPlayer method in Multimedia.api in Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, allows remote attackers to execute arbitrary code via a crafted PDF file using ZLib compressed streams, as exploited in the wild in December 2009.
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
- http://contagiodump.blogspot.com/2009/12/virustotal-httpwww.html
|
||
|
- http://www.symantec.com/connect/blogs/zero-day-xmas-present
|
||
|
|
||
|
#### Github
|
||
|
- https://github.com/0xCyberY/CVE-T4PDF
|
||
|
- https://github.com/ARPSyndicate/cvemon
|
||
|
- https://github.com/Cryin/Paper
|
||
|
- https://github.com/Ostorlab/KEV
|
||
|
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
|
||
|
|