cvelist/2009/0xxx/CVE-2009-0658.json
2019-03-18 02:33:45 +00:00

187 lines
6.6 KiB
JSON

{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2009-0658",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Buffer overflow in Adobe Reader 9.0 and earlier, and Acrobat 9.0 and earlier, allows remote attackers to execute arbitrary code via a crafted PDF document, related to a non-JavaScript function call and possibly an embedded JBIG2 image stream, as exploited in the wild in February 2009 by Trojan.Pidief.E."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.shadowserver.org/wiki/pmwiki.php?n=Calendar.20090219",
"refsource": "MISC",
"url": "http://www.shadowserver.org/wiki/pmwiki.php?n=Calendar.20090219"
},
{
"name": "34790",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/34790"
},
{
"name": "http://www.adobe.com/support/security/bulletins/apsb09-04.html",
"refsource": "CONFIRM",
"url": "http://www.adobe.com/support/security/bulletins/apsb09-04.html"
},
{
"name": "8099",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/8099"
},
{
"name": "oval:org.mitre.oval:def:5697",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5697"
},
{
"name": "http://isc.sans.org/diary.html?n&storyid=5902",
"refsource": "MISC",
"url": "http://isc.sans.org/diary.html?n&storyid=5902"
},
{
"name": "TA09-051A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA09-051A.html"
},
{
"name": "http://www.adobe.com/support/security/advisories/apsa09-01.html",
"refsource": "CONFIRM",
"url": "http://www.adobe.com/support/security/advisories/apsa09-01.html"
},
{
"name": "52073",
"refsource": "OSVDB",
"url": "http://osvdb.org/52073"
},
{
"name": "34490",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/34490"
},
{
"name": "33901",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33901"
},
{
"name": "RHSA-2009:0376",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2009-0376.html"
},
{
"name": "http://www.symantec.com/security_response/writeup.jsp?docid=2009-021212-5523-99&tabid=2",
"refsource": "MISC",
"url": "http://www.symantec.com/security_response/writeup.jsp?docid=2009-021212-5523-99&tabid=2"
},
{
"name": "34392",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/34392"
},
{
"name": "SUSE-SA:2009:014",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00005.html"
},
{
"name": "34706",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/34706"
},
{
"name": "ADV-2009-0472",
"refsource": "FRSIRT",
"url": "http://www.vupen.com/english/advisories/2009/0472"
},
{
"name": "VU#905281",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/905281"
},
{
"name": "256788",
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-256788-1"
},
{
"name": "33751",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/33751"
},
{
"name": "adobe-acrobat-reader-image-bo(48825)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48825"
},
{
"name": "1021739",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1021739"
},
{
"name": "8090",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/8090"
},
{
"name": "GLSA-200904-17",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200904-17.xml"
},
{
"name": "SUSE-SR:2009:009",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html"
},
{
"name": "ADV-2009-1019",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/1019"
}
]
}
}