CVE-2009-2564

N/A Unknown
Published: July 21, 2009 Modified: April 23, 2026
View on NVD

Description

NOS Microsystems getPlus Download Manager, as used in Adobe Reader 1.6.2.36 and possibly other versions, Corel getPlus Download Manager before 1.5.0.48, and possibly other products, installs NOS\bin\getPlus_HelperSvc.exe with insecure permissions (Everyone:Full Control), which allows local users to gain SYSTEM privileges by replacing getPlus_HelperSvc.exe with a Trojan horse program, as demonstrated by use of getPlus Download Manager within Adobe Reader. NOTE: within Adobe Reader, the scope of this issue is limited because the program is deleted and the associated service is not automatically launched after a successful installation and reboot.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/35930
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/36331
Source: cve@mitre.org
Vendor Advisory
http://www.securityfocus.com/bid/35740
Source: cve@mitre.org
Exploit
http://www.us-cert.gov/cas/techalerts/TA09-286B.html
Source: cve@mitre.org
US Government Resource
http://www.vupen.com/english/advisories/2009/1969
Source: cve@mitre.org
Vendor Advisory
http://www.vupen.com/english/advisories/2009/2898
Source: cve@mitre.org
Vendor Advisory
http://retrogod.altervista.org/9sg_adobe_local.html
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit
http://secunia.com/advisories/35930
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/36331
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://securitytracker.com/id?1023007
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.adobe.com/support/security/bulletins/apsb09-15.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.exploit-db.com/exploits/9199
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/505095/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/35740
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit
http://www.us-cert.gov/cas/techalerts/TA09-286B.html
Source: af854a3a-2127-422b-91ae-364da2661108
US Government Resource
http://www.vupen.com/english/advisories/2009/1969
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.vupen.com/english/advisories/2009/2898
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/54383
Source: af854a3a-2127-422b-91ae-364da2661108

28 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
0.3%
51th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

corel nos_microsystems adobe