CVE-2009-4324

7.8 HIGH CISA KEV - Actively Exploited
Published: December 15, 2009 Modified: October 22, 2025

Description

Use-after-free vulnerability in the Doc.media.newPlayer method in Multimedia.api in Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, allows remote attackers to execute arbitrary code via a crafted PDF file using ZLib compressed streams, as exploited in the wild in December 2009.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://blogs.adobe.com/psirt/2009/12/new_adobe_reader_and_acrobat_v.html
Source: psirt@adobe.com
Broken Link Vendor Advisory
http://contagiodump.blogspot.com/2009/12/virustotal-httpwww.html
Source: psirt@adobe.com
Exploit Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html
Source: psirt@adobe.com
Mailing List Third Party Advisory
http://osvdb.org/60980
Source: psirt@adobe.com
Broken Link
http://secunia.com/advisories/37690
Source: psirt@adobe.com
Broken Link Vendor Advisory
http://secunia.com/advisories/38138
Source: psirt@adobe.com
Broken Link Vendor Advisory
http://secunia.com/advisories/38215
Source: psirt@adobe.com
Broken Link Vendor Advisory
http://www.kb.cert.org/vuls/id/508357
Source: psirt@adobe.com
Third Party Advisory US Government Resource
http://www.securityfocus.com/bid/37331
Source: psirt@adobe.com
Broken Link Third Party Advisory VDB Entry
http://www.us-cert.gov/cas/techalerts/TA10-013A.html
Source: psirt@adobe.com
Third Party Advisory US Government Resource
http://www.vupen.com/english/advisories/2009/3518
Source: psirt@adobe.com
Broken Link Vendor Advisory
http://www.vupen.com/english/advisories/2010/0103
Source: psirt@adobe.com
Broken Link
https://bugzilla.redhat.com/show_bug.cgi?id=547799
Source: psirt@adobe.com
Issue Tracking
https://exchange.xforce.ibmcloud.com/vulnerabilities/54747
Source: psirt@adobe.com
Third Party Advisory VDB Entry
http://blogs.adobe.com/psirt/2009/12/new_adobe_reader_and_acrobat_v.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Vendor Advisory
http://contagiodump.blogspot.com/2009/12/virustotal-httpwww.html
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://osvdb.org/60980
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/37690
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Vendor Advisory
http://secunia.com/advisories/38138
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Vendor Advisory
http://secunia.com/advisories/38215
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Vendor Advisory
http://www.adobe.com/support/security/advisories/apsa09-07.html
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.adobe.com/support/security/bulletins/apsb10-02.html
Source: af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://www.kb.cert.org/vuls/id/508357
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory US Government Resource
http://www.redhat.com/support/errata/RHSA-2010-0060.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.securityfocus.com/bid/37331
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Third Party Advisory VDB Entry
http://www.shadowserver.org/wiki/pmwiki.php/Calendar/20091214
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.symantec.com/connect/blogs/zero-day-xmas-present
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.us-cert.gov/cas/techalerts/TA10-013A.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory US Government Resource
http://www.vupen.com/english/advisories/2009/3518
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Vendor Advisory
http://www.vupen.com/english/advisories/2010/0103
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
https://bugzilla.redhat.com/show_bug.cgi?id=547799
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
https://exchange.xforce.ibmcloud.com/vulnerabilities/54747
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry

43 reference(s) from NVD

Quick Stats

CVSS v3 Score
7.8 / 10.0
EPSS (Exploit Probability)
93.0%
100th percentile
Exploitation Status
Actively Exploited
Remediation due: 2022-06-22

Weaknesses (CWE)

Affected Vendors

suse adobe microsoft apple opensuse