Vulnerability Name:
CVE-2008-4817 (CCN-46331)
Assigned:
2008-11-04
Published:
2008-11-04
Updated:
2018-10-30
Summary:
The Download Manager in Adobe Acrobat Professional and Reader 8.1.2 and earlier allows remote attackers to execute arbitrary code via a crafted PDF document that calls an AcroJS function with a long string argument, triggering heap corruption.
CVSS v3 Severity:
10.0 Critical
(CCN CVSS v3.1 Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
)
Exploitability Metrics:
Attack Vector (AV):
Network
Attack Complexity (AC):
Low
Privileges Required (PR):
None
User Interaction (UI):
None
Scope:
Scope (S):
Changed
Impact Metrics:
Confidentiality (C):
High
Integrity (I):
High
Availibility (A):
High
CVSS v2 Severity:
9.3 High
(CVSS v2 Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C
)
6.9 Medium
(Temporal CVSS v2 Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C
)
Exploitability Metrics:
Access Vector (AV):
Network
Access Complexity (AC):
Medium
Authentication (Au):
None
Impact Metrics:
Confidentiality (C):
Complete
Integrity (I):
Complete
Availibility (A):
Complete
9.3 High
(CCN CVSS v2 Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C
)
6.9 Medium
(CCN Temporal CVSS v2 Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C
)
Exploitability Metrics:
Access Vector (AV):
Network
Access Complexity (AC):
Medium
Athentication (Au):
None
Impact Metrics:
Confidentiality (C):
Complete
Integrity (I):
Complete
Availibility (A):
Complete
Vulnerability Type:
CWE-20
Vulnerability Consequences:
Gain Access
References:
Source: MITRE
Type: CNA
CVE-2008-4817
Source: SUNALERT
Type: UNKNOWN
249366
Source: IDEFENSE
Type: UNKNOWN
20081104 Adobe Acrobat Professional And Reader AcroJS Heap Corruption Vulnerability
Source: SUSE
Type: UNKNOWN
SUSE-SR:2008:026
Source: OSVDB
Type: UNKNOWN
49541
Source: CCN
Type: RHSA-2008-0974
Critical: acroread security update
Source: CCN
Type: SA32546
NOS Microsystems getPlus ActiveX Control Buffer Overflow
Source: SECUNIA
Type: UNKNOWN
32700
Source: CCN
Type: SA32872
SUSE Update for Multiple Packages
Source: SECUNIA
Type: UNKNOWN
32872
Source: CCN
Type: SA35163
Nortel Media Processing Server Adobe Reader Multiple Vulnerabilities
Source: CCN
Type: SECTRACK ID: 1021140
Adobe Acrobat Multiple Flaws Let Remote Users Execute Arbitrary Code
Source: CCN
Type: Sun Alert ID: 249366
Multiple Security Vulnerabilities in the Adobe Reader May Lead to Execution of Arbitrary Code
Source: CCN
Type: ASA-2008-439
acroread security update (RHSA-2008-0974)
Source: CCN
Type: ASA-2009-018
Multiple Security Vulnerabilities in the Adobe Reader May Lead to Execution of Arbitrary Code (Sun 249366)
Source: CCN
Type: NORTEL BULLETIN ID: 2008009218, Rev 1
Nortel Response to Adobe Vulnerability Identifier APSB08-19
Source: CCN
Type: NORTEL BULLETIN ID: 2009009504, Rev 1
Nortel: Technical Support: Nortel Response to Sun Alert 249366 - Solaris 10 - Multiple Security Vulnerabilities
Source: CCN
Type: Adobe Product Security Bulletin APSB08-19
Security Update available for Adobe Reader 8 and Acrobat 8
Source: CONFIRM
Type: Patch, Vendor Advisory
http://www.adobe.com/support/security/bulletins/apsb08-19.html
Source: CCN
Type: GLSA-200901-09
Adobe Reader: User-assisted execution of arbitrary code
Source: CCN
Type: NOS Microsystems Web site
getPlus
Source: CCN
Type: OSVDB ID: 49541
Adobe Acrobat / Reader Download Manager AcroJS Function Heap Corruption Arbitrary Code Execution
Source: REDHAT
Type: UNKNOWN
RHSA-2008:0974
Source: CCN
Type: BID-32105
NOS Microsystems getPlus Download Manager ActiveX Control Buffer Overflow Vulnerability
Source: SECTRACK
Type: UNKNOWN
1021140
Source: CERT
Type: US Government Resource
TA08-309A
Source: VUPEN
Type: UNKNOWN
ADV-2008-3001
Source: VUPEN
Type: UNKNOWN
ADV-2009-0098
Source: XF
Type: UNKNOWN
adobe-dlmanager-acrojs-code-execution(46331)
Source: CCN
Type: iDefense Labs PUBLIC ADVISORY: 11.04.08
Adobe Acrobat Professional And Reader AcroJS Heap Corruption Vulnerability
Source: SUSE
Type: SUSE-SR:2008:026
SUSE Security Summary Report
Vulnerable Configuration:
Configuration 1
:
cpe:/a:adobe:download_manager:*:*:*:*:*:*:*:*
AND
cpe:/a:adobe:acrobat:8.1.1:*:*:*:*:*:*:*
OR
cpe:/a:adobe:acrobat:8.1.1:unknown:3d:*:*:*:*:*
OR
cpe:/a:adobe:acrobat:8.1.1:unknown:professional:*:*:*:*:*
OR
cpe:/a:adobe:acrobat:8.1.1:unknown:standard:*:*:*:*:*
OR
cpe:/a:adobe:acrobat:*:unknown:3d:*:*:*:*:*
(Version <= 8.1.2)
OR
cpe:/a:adobe:acrobat:*:unknown:professional:*:*:*:*:*
(Version <= 8.1.2)
OR
cpe:/a:adobe:acrobat:*:unknown:standard:*:*:*:*:*
(Version <= 8.1.2)
OR
cpe:/a:adobe:acrobat_reader:*:*:*:*:*:*:*:*
(Version <= 8.0)
Configuration RedHat 1
:
cpe:/a:redhat:rhel_extras:5:*:*:*:*:*:*:*
Configuration RedHat 2
:
cpe:/a:redhat:rhel_extras:4:*:*:*:*:*:*:*
Configuration RedHat 3
:
cpe:/a:redhat:rhel_extras:3:*:*:*:*:*:*:*
Configuration CCN 1
:
cpe:/a:adobe:acrobat:8.0:*:*:*:*:*:*:*
OR
cpe:/a:adobe:acrobat_reader:8.0:*:*:*:*:*:*:*
OR
cpe:/a:adobe:acrobat_reader:8.1.2:*:*:*:*:*:*:*
OR
cpe:/a:adobe:acrobat:8.1:*:*:*:*:*:*:*
OR
cpe:/a:adobe:acrobat_reader:8.1:*:*:*:*:*:*:*
OR
cpe:/a:adobe:acrobat:8.1.1:*:*:*:*:*:*:*
OR
cpe:/a:adobe:acrobat_reader:8.1.1:*:*:*:*:*:*:*
OR
cpe:/a:adobe:acrobat:8.1.2:*:*:*:*:*:*:*
AND
cpe:/o:gentoo:linux:*:*:*:*:*:*:*:*
OR
cpe:/o:sun:solaris:10::sparc:*:*:*:*:*
OR
cpe:/a:redhat:rhel_extras:3:*:*:*:*:*:*:*
OR
cpe:/a:redhat:rhel_extras:4:*:*:*:*:*:*:*
Denotes that component is vulnerable
Oval Definitions
Definition ID
Class
Title
Last Modified
oval:org.opensuse.security:def:20084817
V
CVE-2008-4817
2015-11-16
oval:org.mitre.oval:def:22747
P
ELSA-2008:0974: acroread security update (Critical)
2014-05-26
oval:com.redhat.rhsa:def:20080974
P
RHSA-2008:0974: acroread security update (Critical)
2008-11-12
BACK
adobe
download manager *
adobe
acrobat 8.1.1
adobe
acrobat 8.1.1 unknown
adobe
acrobat 8.1.1 unknown
adobe
acrobat 8.1.1 unknown
adobe
acrobat * unknown
adobe
acrobat * unknown
adobe
acrobat * unknown
adobe
acrobat reader *
adobe
acrobat 8.0
adobe
acrobat reader 8.0
adobe
acrobat reader 8.1.2
adobe
acrobat 8.1
adobe
acrobat reader 8.1
adobe
acrobat 8.1.1
adobe
acrobat reader 8.1.1
adobe
acrobat 8.1.2
gentoo
linux *
sun
solaris 10
redhat
rhel extras 3
redhat
rhel extras 4