CVE-2009-1493

N/A Unknown
Published: April 30, 2009 Modified: April 23, 2026
View on NVD

Description

The customDictionaryOpen spell method in the JavaScript API in Adobe Reader 9.1, 8.1.4, 7.1.1, and earlier on Linux and UNIX allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a PDF file that triggers a call to this method with a long string in the second argument.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00001.html
Source: cve@mitre.org
Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html
Source: cve@mitre.org
Mailing List Third Party Advisory
http://osvdb.org/54129
Source: cve@mitre.org
Broken Link
http://secunia.com/advisories/34924
Source: cve@mitre.org
Broken Link
http://secunia.com/advisories/35055
Source: cve@mitre.org
Broken Link
http://secunia.com/advisories/35096
Source: cve@mitre.org
Broken Link
http://secunia.com/advisories/35152
Source: cve@mitre.org
Broken Link
http://secunia.com/advisories/35358
Source: cve@mitre.org
Broken Link
http://secunia.com/advisories/35416
Source: cve@mitre.org
Broken Link
http://secunia.com/advisories/35734
Source: cve@mitre.org
Broken Link
http://security.gentoo.org/glsa/glsa-200907-06.xml
Source: cve@mitre.org
Third Party Advisory
http://www.adobe.com/support/security/bulletins/apsb09-06.html
Source: cve@mitre.org
Third Party Advisory
http://www.kb.cert.org/vuls/id/970180
Source: cve@mitre.org
Third Party Advisory US Government Resource
http://www.redhat.com/support/errata/RHSA-2009-0478.html
Source: cve@mitre.org
Third Party Advisory
http://www.securityfocus.com/bid/34740
Source: cve@mitre.org
Exploit Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1022139
Source: cve@mitre.org
Third Party Advisory VDB Entry
http://www.us-cert.gov/cas/techalerts/TA09-133B.html
Source: cve@mitre.org
Third Party Advisory US Government Resource
http://www.vupen.com/english/advisories/2009/1189
Source: cve@mitre.org
Broken Link
http://www.vupen.com/english/advisories/2009/1317
Source: cve@mitre.org
Broken Link
https://exchange.xforce.ibmcloud.com/vulnerabilities/50146
Source: cve@mitre.org
Third Party Advisory VDB Entry
https://www.exploit-db.com/exploits/8570
Source: cve@mitre.org
Third Party Advisory VDB Entry
http://blogs.adobe.com/psirt/2009/04/update_on_adobe_reader_issue.html
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://blogs.adobe.com/psirt/2009/05/adobe_reader_issue_update.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00001.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://osvdb.org/54129
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://packetstorm.linuxsecurity.com/0904-exploits/spell.txt
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit
http://secunia.com/advisories/34924
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/35055
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/35096
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/35152
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/35358
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/35416
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/35734
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://security.gentoo.org/glsa/glsa-200907-06.xml
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://sunsolve.sun.com/search/document.do?assetkey=1-66-259028-1
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=926953
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.adobe.com/support/security/bulletins/apsb09-06.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.kb.cert.org/vuls/id/970180
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory US Government Resource
http://www.redhat.com/support/errata/RHSA-2009-0478.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.securityfocus.com/bid/34740
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1022139
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://www.us-cert.gov/cas/techalerts/TA09-133B.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory US Government Resource
http://www.vupen.com/english/advisories/2009/1189
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.vupen.com/english/advisories/2009/1317
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
https://exchange.xforce.ibmcloud.com/vulnerabilities/50146
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
https://www.exploit-db.com/exploits/8570
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry

52 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
76.2%
99th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

linux adobe