Double free vulnerability in the Adobe Acrobat Reader Plugin before 8.0.0, as used in Mozilla Firefox 1.5.0.7, allows remote attackers to execute arbitrary code by causing an error via a javascript: URI call to document.write in the (1) FDF, (2) XML, or (3) XFDF AJAX request parameters.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Acrobat_reader | Adobe | * | 7.0.8 (including) |
Acroread | Ubuntu | dapper | * |
Acroread | Ubuntu | edgy | * |
Extras for RHEL 3 | RedHat | acroread-0:7.0.9-1.1.1.EL3 | * |
Extras for RHEL 3 | RedHat | acroread-libs-atk-0:1.8.0-1.el3 | * |
Extras for RHEL 3 | RedHat | acroread-libs-glib2-0:2.4.7-1 | * |
Extras for RHEL 3 | RedHat | acroread-libs-gtk2-0:2.4.13-1.el3 | * |
Extras for RHEL 3 | RedHat | acroread-libs-gtk2-engines-0:2.2.0-1.el3 | * |
Extras for RHEL 3 | RedHat | acroread-libs-pango-0:1.6.0-1.el3 | * |
Extras for RHEL 4 | RedHat | acroread-0:7.0.9-1.2.0.EL4 | * |