HTTP: Adobe Reader JavaScript spell.customDictionaryOpen Method Memory Corruption

This signature detects attempts to exploit a known vulnerability against Adobe Acrobat and Reader. A successful attack can lead to arbitrary code execution.

Extended Description

Adobe Reader is prone to a remote code-execution vulnerability. An attacker can exploit this issue to execute arbitrary code with the privileges of the user running the application or crash the application, denying service to legitimate users. Reader 8.1.4 for Linux is vulnerable; other versions or platforms may also be affected. UPDATE (April 30, 2009): Further information from the reporter states that the issue does not affect Reader 9.1; only 8.1.4 is affected. UPDATE (May 1, 2009): The vendor indicates that fixes will be available by May 12, 2009. Please see the referenced advisory for more information. UPDATE (May 18, 2009): The vendor indicates that fixes for Adobe Reader 7 for Apple Mac OS X will be available by the end of June, 2009. Please see the updated advisory for more information.

Affected Products

Nortel_networks self-service_speech_server,Red_hat enterprise_linux_as_extras

References

BugTraq: 34740

CVE: CVE-2009-1493

Short Name
HTTP:STC:ADOBE:PDF-SPELL-MC
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
Adobe CVE-2009-1493 Corruption JavaScript Memory Method Reader bid:34740 spell.customDictionaryOpen
Release Date
07/21/2011
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3691
False Positive
Unknown
Vendors

Red_hat

Adobe

Gentoo

Sun

Avaya

Nortel_networks

Suse

CVSS Score

6.8

Found a potential security threat?