CVE-2009-1862 (GCVE-0-2009-1862)
Vulnerability from cvelistv5
Published
2009-07-23 20:00
Modified
2025-10-22 00:05
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Unspecified vulnerability in Adobe Reader and Acrobat 9.x through 9.1.2, and Adobe Flash Player 9.x through 9.0.159.0 and 10.x through 10.0.22.87, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via (1) a crafted Flash application in a .pdf file or (2) a crafted .swf file, related to authplay.dll, as exploited in the wild in July 2009.
References
CISA Known Exploited Vulnerability
Data from the CISA Known Exploited Vulnerabilities Catalog
Date added: 2022-06-08
Due date: 2022-06-22
Required action: For Adobe Acrobat and Reader, apply updates per vendor instructions. For Adobe Flash Player, the impacted product is end-of-life and should be disconnected if still in use.
Used in ransomware: Unknown
Notes: https://nvd.nist.gov/vuln/detail/CVE-2009-1862
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T05:27:54.654Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "266108",
"tags": [
"vendor-advisory",
"x_refsource_SUNALERT",
"x_transferred"
],
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-266108-1"
},
{
"name": "VU#259425",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN",
"x_transferred"
],
"url": "http://www.kb.cert.org/vuls/id/259425"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.symantec.com/business/security_response/writeup.jsp?docid=2009-072209-2512-99"
},
{
"name": "APPLE-SA-2009-09-10-1",
"tags": [
"vendor-advisory",
"x_refsource_APPLE",
"x_transferred"
],
"url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00003.html"
},
{
"name": "GLSA-200908-04",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://security.gentoo.org/glsa/glsa-200908-04.xml"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.apple.com/kb/HT3864"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://isc.sans.org/diary.html?storyid=6847"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.adobe.com/support/security/bulletins/apsb09-13.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://blogs.adobe.com/psirt/2009/07/potential_adobe_reader_and_fla.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.symantec.com/connect/blogs/next-generation-flash-vulnerability"
},
{
"name": "APPLE-SA-2009-09-10-2",
"tags": [
"vendor-advisory",
"x_refsource_APPLE",
"x_transferred"
],
"url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00004.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://bugs.adobe.com/jira/browse/FP-1265"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.adobe.com/support/security/bulletins/apsb09-10.html"
},
{
"name": "36374",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/36374"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.apple.com/kb/HT3865"
},
{
"name": "36193",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/36193"
},
{
"name": "36701",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/36701"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.adobe.com/support/security/advisories/apsa09-03.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://news.cnet.com/8301-27080_3-10293389-245.html"
},
{
"name": "35759",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/35759"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2009-1862",
"options": [
{
"Exploitation": "active"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-02-10T18:44:49.743895Z",
"version": "2.0.3"
},
"type": "ssvc"
}
},
{
"other": {
"content": {
"dateAdded": "2022-06-08",
"reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2009-1862"
},
"type": "kev"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-787",
"description": "CWE-787 Out-of-bounds Write",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-22T00:05:54.394Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"references": [
{
"tags": [
"government-resource"
],
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2009-1862"
}
],
"timeline": [
{
"lang": "en",
"time": "2022-06-08T00:00:00.000Z",
"value": "CVE-2009-1862 added to CISA KEV"
}
],
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2009-07-21T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in Adobe Reader and Acrobat 9.x through 9.1.2, and Adobe Flash Player 9.x through 9.0.159.0 and 10.x through 10.0.22.87, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via (1) a crafted Flash application in a .pdf file or (2) a crafted .swf file, related to authplay.dll, as exploited in the wild in July 2009."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2009-07-28T09:00:00.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "266108",
"tags": [
"vendor-advisory",
"x_refsource_SUNALERT"
],
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-266108-1"
},
{
"name": "VU#259425",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN"
],
"url": "http://www.kb.cert.org/vuls/id/259425"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.symantec.com/business/security_response/writeup.jsp?docid=2009-072209-2512-99"
},
{
"name": "APPLE-SA-2009-09-10-1",
"tags": [
"vendor-advisory",
"x_refsource_APPLE"
],
"url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00003.html"
},
{
"name": "GLSA-200908-04",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://security.gentoo.org/glsa/glsa-200908-04.xml"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.apple.com/kb/HT3864"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://isc.sans.org/diary.html?storyid=6847"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.adobe.com/support/security/bulletins/apsb09-13.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://blogs.adobe.com/psirt/2009/07/potential_adobe_reader_and_fla.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.symantec.com/connect/blogs/next-generation-flash-vulnerability"
},
{
"name": "APPLE-SA-2009-09-10-2",
"tags": [
"vendor-advisory",
"x_refsource_APPLE"
],
"url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00004.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://bugs.adobe.com/jira/browse/FP-1265"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.adobe.com/support/security/bulletins/apsb09-10.html"
},
{
"name": "36374",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/36374"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.apple.com/kb/HT3865"
},
{
"name": "36193",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/36193"
},
{
"name": "36701",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/36701"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.adobe.com/support/security/advisories/apsa09-03.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://news.cnet.com/8301-27080_3-10293389-245.html"
},
{
"name": "35759",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/35759"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2009-1862",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Unspecified vulnerability in Adobe Reader and Acrobat 9.x through 9.1.2, and Adobe Flash Player 9.x through 9.0.159.0 and 10.x through 10.0.22.87, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via (1) a crafted Flash application in a .pdf file or (2) a crafted .swf file, related to authplay.dll, as exploited in the wild in July 2009."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "266108",
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-266108-1"
},
{
"name": "VU#259425",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/259425"
},
{
"name": "http://www.symantec.com/business/security_response/writeup.jsp?docid=2009-072209-2512-99",
"refsource": "MISC",
"url": "http://www.symantec.com/business/security_response/writeup.jsp?docid=2009-072209-2512-99"
},
{
"name": "APPLE-SA-2009-09-10-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00003.html"
},
{
"name": "GLSA-200908-04",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200908-04.xml"
},
{
"name": "http://support.apple.com/kb/HT3864",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT3864"
},
{
"name": "http://isc.sans.org/diary.html?storyid=6847",
"refsource": "MISC",
"url": "http://isc.sans.org/diary.html?storyid=6847"
},
{
"name": "http://www.adobe.com/support/security/bulletins/apsb09-13.html",
"refsource": "CONFIRM",
"url": "http://www.adobe.com/support/security/bulletins/apsb09-13.html"
},
{
"name": "http://blogs.adobe.com/psirt/2009/07/potential_adobe_reader_and_fla.html",
"refsource": "MISC",
"url": "http://blogs.adobe.com/psirt/2009/07/potential_adobe_reader_and_fla.html"
},
{
"name": "http://www.symantec.com/connect/blogs/next-generation-flash-vulnerability",
"refsource": "MISC",
"url": "http://www.symantec.com/connect/blogs/next-generation-flash-vulnerability"
},
{
"name": "APPLE-SA-2009-09-10-2",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00004.html"
},
{
"name": "http://bugs.adobe.com/jira/browse/FP-1265",
"refsource": "MISC",
"url": "http://bugs.adobe.com/jira/browse/FP-1265"
},
{
"name": "http://www.adobe.com/support/security/bulletins/apsb09-10.html",
"refsource": "CONFIRM",
"url": "http://www.adobe.com/support/security/bulletins/apsb09-10.html"
},
{
"name": "36374",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/36374"
},
{
"name": "http://support.apple.com/kb/HT3865",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT3865"
},
{
"name": "36193",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/36193"
},
{
"name": "36701",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/36701"
},
{
"name": "http://www.adobe.com/support/security/advisories/apsa09-03.html",
"refsource": "CONFIRM",
"url": "http://www.adobe.com/support/security/advisories/apsa09-03.html"
},
{
"name": "http://news.cnet.com/8301-27080_3-10293389-245.html",
"refsource": "MISC",
"url": "http://news.cnet.com/8301-27080_3-10293389-245.html"
},
{
"name": "35759",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/35759"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2009-1862",
"datePublished": "2009-07-23T20:00:00.000Z",
"dateReserved": "2009-06-01T00:00:00.000Z",
"dateUpdated": "2025-10-22T00:05:54.394Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"cisa_known_exploited": {
"cveID": "CVE-2009-1862",
"cwes": "[\"CWE-94\"]",
"dateAdded": "2022-06-08",
"dueDate": "2022-06-22",
"knownRansomwareCampaignUse": "Unknown",
"notes": "https://nvd.nist.gov/vuln/detail/CVE-2009-1862",
"product": "Acrobat and Reader, Flash Player",
"requiredAction": "For Adobe Acrobat and Reader, apply updates per vendor instructions. For Adobe Flash Player, the impacted product is end-of-life and should be disconnected if still in use.",
"shortDescription": "Adobe Acrobat and Reader and Adobe Flash Player allows remote attackers to execute code or cause denial-of-service (DoS).",
"vendorProject": "Adobe",
"vulnerabilityName": "Adobe Acrobat and Reader, Flash Player Unspecified Vulnerability"
},
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"http://sunsolve.sun.com/search/document.do?assetkey=1-66-266108-1\", \"name\": \"266108\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUNALERT\", \"x_transferred\"]}, {\"url\": \"http://www.kb.cert.org/vuls/id/259425\", \"name\": \"VU#259425\", \"tags\": [\"third-party-advisory\", \"x_refsource_CERT-VN\", \"x_transferred\"]}, {\"url\": \"http://www.symantec.com/business/security_response/writeup.jsp?docid=2009-072209-2512-99\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"http://lists.apple.com/archives/security-announce/2009/Sep/msg00003.html\", \"name\": \"APPLE-SA-2009-09-10-1\", \"tags\": [\"vendor-advisory\", \"x_refsource_APPLE\", \"x_transferred\"]}, {\"url\": \"http://security.gentoo.org/glsa/glsa-200908-04.xml\", \"name\": \"GLSA-200908-04\", \"tags\": [\"vendor-advisory\", \"x_refsource_GENTOO\", \"x_transferred\"]}, {\"url\": \"http://support.apple.com/kb/HT3864\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://isc.sans.org/diary.html?storyid=6847\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"http://www.adobe.com/support/security/bulletins/apsb09-13.html\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://blogs.adobe.com/psirt/2009/07/potential_adobe_reader_and_fla.html\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"http://www.symantec.com/connect/blogs/next-generation-flash-vulnerability\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"http://lists.apple.com/archives/security-announce/2009/Sep/msg00004.html\", \"name\": \"APPLE-SA-2009-09-10-2\", \"tags\": [\"vendor-advisory\", \"x_refsource_APPLE\", \"x_transferred\"]}, {\"url\": \"http://bugs.adobe.com/jira/browse/FP-1265\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"http://www.adobe.com/support/security/bulletins/apsb09-10.html\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://secunia.com/advisories/36374\", \"name\": \"36374\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\", \"x_transferred\"]}, {\"url\": \"http://support.apple.com/kb/HT3865\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://secunia.com/advisories/36193\", \"name\": \"36193\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\", \"x_transferred\"]}, {\"url\": \"http://secunia.com/advisories/36701\", \"name\": \"36701\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\", \"x_transferred\"]}, {\"url\": \"http://www.adobe.com/support/security/advisories/apsa09-03.html\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://news.cnet.com/8301-27080_3-10293389-245.html\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"http://www.securityfocus.com/bid/35759\", \"name\": \"35759\", \"tags\": [\"vdb-entry\", \"x_refsource_BID\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-07T05:27:54.654Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.8, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2009-1862\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"active\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-02-10T18:44:49.743895Z\"}}}, {\"other\": {\"type\": \"kev\", \"content\": {\"dateAdded\": \"2022-06-08\", \"reference\": \"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2009-1862\"}}}], \"timeline\": [{\"lang\": \"en\", \"time\": \"2022-06-08T00:00:00.000Z\", \"value\": \"CVE-2009-1862 added to CISA KEV\"}], \"references\": [{\"url\": \"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2009-1862\", \"tags\": [\"government-resource\"]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-787\", \"description\": \"CWE-787 Out-of-bounds Write\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-02-10T18:44:42.675Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"n/a\", \"product\": \"n/a\", \"versions\": [{\"status\": \"affected\", \"version\": \"n/a\"}]}], \"datePublic\": \"2009-07-21T00:00:00.000Z\", \"references\": [{\"url\": \"http://sunsolve.sun.com/search/document.do?assetkey=1-66-266108-1\", \"name\": \"266108\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUNALERT\"]}, {\"url\": \"http://www.kb.cert.org/vuls/id/259425\", \"name\": \"VU#259425\", \"tags\": [\"third-party-advisory\", \"x_refsource_CERT-VN\"]}, {\"url\": \"http://www.symantec.com/business/security_response/writeup.jsp?docid=2009-072209-2512-99\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"http://lists.apple.com/archives/security-announce/2009/Sep/msg00003.html\", \"name\": \"APPLE-SA-2009-09-10-1\", \"tags\": [\"vendor-advisory\", \"x_refsource_APPLE\"]}, {\"url\": \"http://security.gentoo.org/glsa/glsa-200908-04.xml\", \"name\": \"GLSA-200908-04\", \"tags\": [\"vendor-advisory\", \"x_refsource_GENTOO\"]}, {\"url\": \"http://support.apple.com/kb/HT3864\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://isc.sans.org/diary.html?storyid=6847\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"http://www.adobe.com/support/security/bulletins/apsb09-13.html\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://blogs.adobe.com/psirt/2009/07/potential_adobe_reader_and_fla.html\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"http://www.symantec.com/connect/blogs/next-generation-flash-vulnerability\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"http://lists.apple.com/archives/security-announce/2009/Sep/msg00004.html\", \"name\": \"APPLE-SA-2009-09-10-2\", \"tags\": [\"vendor-advisory\", \"x_refsource_APPLE\"]}, {\"url\": \"http://bugs.adobe.com/jira/browse/FP-1265\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"http://www.adobe.com/support/security/bulletins/apsb09-10.html\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://secunia.com/advisories/36374\", \"name\": \"36374\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\"]}, {\"url\": \"http://support.apple.com/kb/HT3865\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://secunia.com/advisories/36193\", \"name\": \"36193\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\"]}, {\"url\": \"http://secunia.com/advisories/36701\", \"name\": \"36701\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\"]}, {\"url\": \"http://www.adobe.com/support/security/advisories/apsa09-03.html\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://news.cnet.com/8301-27080_3-10293389-245.html\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"http://www.securityfocus.com/bid/35759\", \"name\": \"35759\", \"tags\": [\"vdb-entry\", \"x_refsource_BID\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Unspecified vulnerability in Adobe Reader and Acrobat 9.x through 9.1.2, and Adobe Flash Player 9.x through 9.0.159.0 and 10.x through 10.0.22.87, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via (1) a crafted Flash application in a .pdf file or (2) a crafted .swf file, related to authplay.dll, as exploited in the wild in July 2009.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"n/a\"}]}], \"providerMetadata\": {\"orgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"shortName\": \"mitre\", \"dateUpdated\": \"2009-07-28T09:00:00.000Z\"}, \"x_legacyV4Record\": {\"affects\": {\"vendor\": {\"vendor_data\": [{\"product\": {\"product_data\": [{\"version\": {\"version_data\": [{\"version_value\": \"n/a\"}]}, \"product_name\": \"n/a\"}]}, \"vendor_name\": \"n/a\"}]}}, \"data_type\": \"CVE\", \"references\": {\"reference_data\": [{\"url\": \"http://sunsolve.sun.com/search/document.do?assetkey=1-66-266108-1\", \"name\": \"266108\", \"refsource\": \"SUNALERT\"}, {\"url\": \"http://www.kb.cert.org/vuls/id/259425\", \"name\": \"VU#259425\", \"refsource\": \"CERT-VN\"}, {\"url\": \"http://www.symantec.com/business/security_response/writeup.jsp?docid=2009-072209-2512-99\", \"name\": \"http://www.symantec.com/business/security_response/writeup.jsp?docid=2009-072209-2512-99\", \"refsource\": \"MISC\"}, {\"url\": \"http://lists.apple.com/archives/security-announce/2009/Sep/msg00003.html\", \"name\": \"APPLE-SA-2009-09-10-1\", \"refsource\": \"APPLE\"}, {\"url\": \"http://security.gentoo.org/glsa/glsa-200908-04.xml\", \"name\": \"GLSA-200908-04\", \"refsource\": \"GENTOO\"}, {\"url\": \"http://support.apple.com/kb/HT3864\", \"name\": \"http://support.apple.com/kb/HT3864\", \"refsource\": \"CONFIRM\"}, {\"url\": \"http://isc.sans.org/diary.html?storyid=6847\", \"name\": \"http://isc.sans.org/diary.html?storyid=6847\", \"refsource\": \"MISC\"}, {\"url\": \"http://www.adobe.com/support/security/bulletins/apsb09-13.html\", \"name\": \"http://www.adobe.com/support/security/bulletins/apsb09-13.html\", \"refsource\": \"CONFIRM\"}, {\"url\": \"http://blogs.adobe.com/psirt/2009/07/potential_adobe_reader_and_fla.html\", \"name\": \"http://blogs.adobe.com/psirt/2009/07/potential_adobe_reader_and_fla.html\", \"refsource\": \"MISC\"}, {\"url\": \"http://www.symantec.com/connect/blogs/next-generation-flash-vulnerability\", \"name\": \"http://www.symantec.com/connect/blogs/next-generation-flash-vulnerability\", \"refsource\": \"MISC\"}, {\"url\": \"http://lists.apple.com/archives/security-announce/2009/Sep/msg00004.html\", \"name\": \"APPLE-SA-2009-09-10-2\", \"refsource\": \"APPLE\"}, {\"url\": \"http://bugs.adobe.com/jira/browse/FP-1265\", \"name\": \"http://bugs.adobe.com/jira/browse/FP-1265\", \"refsource\": \"MISC\"}, {\"url\": \"http://www.adobe.com/support/security/bulletins/apsb09-10.html\", \"name\": \"http://www.adobe.com/support/security/bulletins/apsb09-10.html\", \"refsource\": \"CONFIRM\"}, {\"url\": \"http://secunia.com/advisories/36374\", \"name\": \"36374\", \"refsource\": \"SECUNIA\"}, {\"url\": \"http://support.apple.com/kb/HT3865\", \"name\": \"http://support.apple.com/kb/HT3865\", \"refsource\": \"CONFIRM\"}, {\"url\": \"http://secunia.com/advisories/36193\", \"name\": \"36193\", \"refsource\": \"SECUNIA\"}, {\"url\": \"http://secunia.com/advisories/36701\", \"name\": \"36701\", \"refsource\": \"SECUNIA\"}, {\"url\": \"http://www.adobe.com/support/security/advisories/apsa09-03.html\", \"name\": \"http://www.adobe.com/support/security/advisories/apsa09-03.html\", \"refsource\": \"CONFIRM\"}, {\"url\": \"http://news.cnet.com/8301-27080_3-10293389-245.html\", \"name\": \"http://news.cnet.com/8301-27080_3-10293389-245.html\", \"refsource\": \"MISC\"}, {\"url\": \"http://www.securityfocus.com/bid/35759\", \"name\": \"35759\", \"refsource\": \"BID\"}]}, \"data_format\": \"MITRE\", \"description\": {\"description_data\": [{\"lang\": \"eng\", \"value\": \"Unspecified vulnerability in Adobe Reader and Acrobat 9.x through 9.1.2, and Adobe Flash Player 9.x through 9.0.159.0 and 10.x through 10.0.22.87, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via (1) a crafted Flash application in a .pdf file or (2) a crafted .swf file, related to authplay.dll, as exploited in the wild in July 2009.\"}]}, \"problemtype\": {\"problemtype_data\": [{\"description\": [{\"lang\": \"eng\", \"value\": \"n/a\"}]}]}, \"data_version\": \"4.0\", \"CVE_data_meta\": {\"ID\": \"CVE-2009-1862\", \"STATE\": \"PUBLIC\", \"ASSIGNER\": \"cve@mitre.org\"}}}}",
"cveMetadata": "{\"cveId\": \"CVE-2009-1862\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-10-22T00:05:54.394Z\", \"dateReserved\": \"2009-06-01T00:00:00.000Z\", \"assignerOrgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"datePublished\": \"2009-07-23T20:00:00.000Z\", \"assignerShortName\": \"mitre\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…