CVE-2009-3953

8.8 HIGH CISA KEV - Actively Exploited
Published: January 13, 2010 Modified: October 22, 2025

Description

The U3D implementation in Adobe Reader and Acrobat 9.x before 9.3, 8.x before 8.2 on Windows and Mac OS X, and 7.x before 7.1.4 allows remote attackers to execute arbitrary code via malformed U3D data in a PDF document, related to a CLODProgressiveMeshDeclaration "array boundary issue," a different vulnerability than CVE-2009-2994.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html
Source: psirt@adobe.com
Mailing List Third Party Advisory
http://osvdb.org/61690
Source: psirt@adobe.com
Broken Link
http://secunia.com/advisories/38138
Source: psirt@adobe.com
Broken Link
http://secunia.com/advisories/38215
Source: psirt@adobe.com
Broken Link
http://www.adobe.com/support/security/bulletins/apsb10-02.html
Source: psirt@adobe.com
Not Applicable Patch Vendor Advisory
http://www.securityfocus.com/bid/37758
Source: psirt@adobe.com
Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1023446
Source: psirt@adobe.com
Broken Link Third Party Advisory VDB Entry
http://www.us-cert.gov/cas/techalerts/TA10-013A.html
Source: psirt@adobe.com
Third Party Advisory US Government Resource
http://www.vupen.com/english/advisories/2010/0103
Source: psirt@adobe.com
Broken Link Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=554293
Source: psirt@adobe.com
Issue Tracking
https://exchange.xforce.ibmcloud.com/vulnerabilities/55551
Source: psirt@adobe.com
Third Party Advisory VDB Entry
http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://osvdb.org/61690
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/38138
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/38215
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.adobe.com/support/security/bulletins/apsb10-02.html
Source: af854a3a-2127-422b-91ae-364da2661108
Not Applicable Patch Vendor Advisory
http://www.metasploit.com/modules/exploit/windows/fileformat/adobe_u3d_meshdecl
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2010-0060.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.securityfocus.com/bid/37758
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1023446
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Third Party Advisory VDB Entry
http://www.us-cert.gov/cas/techalerts/TA10-013A.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory US Government Resource
http://www.vupen.com/english/advisories/2010/0103
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=554293
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
https://exchange.xforce.ibmcloud.com/vulnerabilities/55551
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry

29 reference(s) from NVD

Quick Stats

CVSS v3 Score
8.8 / 10.0
EPSS (Exploit Probability)
90.5%
100th percentile
Exploitation Status
Actively Exploited
Remediation due: 2022-06-22

Weaknesses (CWE)

Affected Vendors

suse adobe microsoft apple opensuse