CVE-2009-4764
Severity CVSS v4.0:
Pending analysis
Type:
CWE-94
Code Injection
Publication date:
05/04/2010
Last modified:
11/04/2025
Description
Adobe Reader 8.x and 9.x on Windows is able to execute EXE files that are embedded in a PDF document, which makes it easier for remote attackers to trick users into executing arbitrary code via a crafted document.
Impact
Base Score 2.0
9.30
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:adobe:acrobat_reader:8.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:adobe:acrobat_reader:8.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:adobe:acrobat_reader:8.1.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:adobe:acrobat_reader:8.1.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:adobe:acrobat_reader:8.1.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:adobe:acrobat_reader:8.1.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:adobe:acrobat_reader:8.1.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:adobe:acrobat_reader:8.1.7:*:*:*:*:*:*:* | ||
| cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:adobe:acrobat_reader:9.1.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:adobe:acrobat_reader:9.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:adobe:acrobat_reader:9.3:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.immunitysec.com/pipermail/dailydave/2010-April/006072.html
- http://lists.immunitysec.com/pipermail/dailydave/2010-April/006074.html
- http://www.metasploit.com/redmine/projects/framework/repository/revisions/8379/changes/modules/exploits/windows/fileformat/adobe_pdf_embedded_exe.rb
- https://exchange.xforce.ibmcloud.com/vulnerabilities/57994
- https://forum.immunityinc.com/board/thread/1199/exploiting-pdf-files-without-vulnerabili/?page=1#post-1199
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6976
- http://lists.immunitysec.com/pipermail/dailydave/2010-April/006072.html
- http://lists.immunitysec.com/pipermail/dailydave/2010-April/006074.html
- http://www.metasploit.com/redmine/projects/framework/repository/revisions/8379/changes/modules/exploits/windows/fileformat/adobe_pdf_embedded_exe.rb
- https://exchange.xforce.ibmcloud.com/vulnerabilities/57994
- https://forum.immunityinc.com/board/thread/1199/exploiting-pdf-files-without-vulnerabili/?page=1#post-1199
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6976



