CVE Vulnerabilities

CVE-2009-4324

Use After Free

Published: Dec 15, 2009 | Modified: Feb 13, 2025
CVSS 3.x
7.8
HIGH
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVSS 2.x
9.3 HIGH
AV:N/AC:M/Au:N/C:C/I:C/A:C
RedHat/V2
6.8 CRITICAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
RedHat/V3
Ubuntu
LOW

Use-after-free vulnerability in the Doc.media.newPlayer method in Multimedia.api in Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, allows remote attackers to execute arbitrary code via a crafted PDF file using ZLib compressed streams, as exploited in the wild in December 2009.

Weakness

The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory “belongs” to the code that operates on the new pointer.

Affected Software

Name Vendor Start Version End Version
Acrobat Adobe 8.0 (including) 8.2 (excluding)
Acrobat Adobe 9.0 (including) 9.3 (excluding)
Acrobat_reader Adobe 8.0 (including) 8.2 (excluding)
Acrobat_reader Adobe 9.0 (including) 9.3 (excluding)
Extras for RHEL 3 RedHat acroread-0:9.3-3 *
Extras for RHEL 4 RedHat acroread-0:9.3-1.el4 *
Supplementary for Red Hat Enterprise Linux 5 RedHat acroread-0:9.3-1.el5 *
Acroread Ubuntu dapper *
Acroread Ubuntu devel *
Acroread Ubuntu hardy *
Acroread Ubuntu intrepid *
Acroread Ubuntu jaunty *
Acroread Ubuntu karmic *

Potential Mitigations

References