CVE-2008-2641
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
25/06/2008
Last modified:
09/04/2025
Description
Unspecified vulnerability in Adobe Reader and Acrobat 7.0.9 and earlier, and 8.0 through 8.1.2, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unknown vectors, related to an "input validation issue in a JavaScript method."
Impact
Base Score 2.0
10.00
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:adobe:acrobat_3d:7.0:*:professional:*:*:*:*:* | ||
| cpe:2.3:a:adobe:acrobat_3d:7.0:*:standard:*:*:*:*:* | ||
| cpe:2.3:a:adobe:acrobat_3d:7.0.0:*:professional:*:*:*:*:* | ||
| cpe:2.3:a:adobe:acrobat_3d:7.0.0:*:standard:*:*:*:*:* | ||
| cpe:2.3:a:adobe:acrobat_3d:7.0.1:*:professional:*:*:*:*:* | ||
| cpe:2.3:a:adobe:acrobat_3d:7.0.1:*:standard:*:*:*:*:* | ||
| cpe:2.3:a:adobe:acrobat_3d:7.0.2:*:professional:*:*:*:*:* | ||
| cpe:2.3:a:adobe:acrobat_3d:7.0.2:*:standard:*:*:*:*:* | ||
| cpe:2.3:a:adobe:acrobat_3d:7.0.3:*:professional:*:*:*:*:* | ||
| cpe:2.3:a:adobe:acrobat_3d:7.0.3:*:standard:*:*:*:*:* | ||
| cpe:2.3:a:adobe:acrobat_3d:7.0.4:*:professional:*:*:*:*:* | ||
| cpe:2.3:a:adobe:acrobat_3d:7.0.4:*:standard:*:*:*:*:* | ||
| cpe:2.3:a:adobe:acrobat_3d:7.0.5:*:professional:*:*:*:*:* | ||
| cpe:2.3:a:adobe:acrobat_3d:7.0.5:*:standard:*:*:*:*:* | ||
| cpe:2.3:a:adobe:acrobat_3d:7.0.6:*:professional:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://isc.sans.org/diary.html?storyid=4616
- http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00001.html
- http://secunia.com/advisories/30832
- http://secunia.com/advisories/31136
- http://secunia.com/advisories/31339
- http://secunia.com/advisories/31352
- http://secunia.com/advisories/31428
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-240106-1
- http://www.adobe.com/support/security/bulletins/apsb08-15.html
- http://www.gentoo.org/security/en/glsa/glsa-200808-10.xml
- http://www.kb.cert.org/vuls/id/788019
- http://www.redhat.com/support/errata/RHSA-2008-0641.html
- http://www.securityfocus.com/bid/29908
- http://www.securitytracker.com/id?1020352=
- http://www.vupen.com/english/advisories/2008/1906
- http://www.vupen.com/english/advisories/2008/2289
- https://exchange.xforce.ibmcloud.com/vulnerabilities/43307
- http://isc.sans.org/diary.html?storyid=4616
- http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00001.html
- http://secunia.com/advisories/30832
- http://secunia.com/advisories/31136
- http://secunia.com/advisories/31339
- http://secunia.com/advisories/31352
- http://secunia.com/advisories/31428
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-240106-1
- http://www.adobe.com/support/security/bulletins/apsb08-15.html
- http://www.gentoo.org/security/en/glsa/glsa-200808-10.xml
- http://www.kb.cert.org/vuls/id/788019
- http://www.redhat.com/support/errata/RHSA-2008-0641.html
- http://www.securityfocus.com/bid/29908
- http://www.securitytracker.com/id?1020352=
- http://www.vupen.com/english/advisories/2008/1906
- http://www.vupen.com/english/advisories/2008/2289
- https://exchange.xforce.ibmcloud.com/vulnerabilities/43307



