Vulnerability Details : CVE-2009-3953
Public exploit exists!
The U3D implementation in Adobe Reader and Acrobat 9.x before 9.3, 8.x before 8.2 on Windows and Mac OS X, and 7.x before 7.1.4 allows remote attackers to execute arbitrary code via malformed U3D data in a PDF document, related to a CLODProgressiveMeshDeclaration "array boundary issue," a different vulnerability than CVE-2009-2994.
Vulnerability category: Execute code
Products affected by CVE-2009-3953
- cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*
- cpe:2.3:a:suse:linux_enterprise_debuginfo:11:-:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise:10.0:sp3:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise:10.0:sp2:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
CVE-2009-3953 is in the CISA Known Exploited Vulnerabilities Catalog
CISA vulnerability name:
Adobe Acrobat and Reader Universal 3D Remote Code Execution Vulnerability
CISA required action:
Apply updates per vendor instructions.
CISA description:
Adobe Acrobat and Reader contains an array boundary issue in Universal 3D (U3D) support that could lead to remote code execution.
Notes:
https://nvd.nist.gov/vuln/detail/CVE-2009-3953
Added on
2022-06-08
Action due date
2022-06-22
Exploit prediction scoring system (EPSS) score for CVE-2009-3953
96.28%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 100 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2009-3953
-
Adobe U3D CLODProgressiveMeshDeclaration Array Overrun
Disclosure Date: 2009-10-13First seen: 2020-04-26exploit/windows/fileformat/adobe_u3d_meshdeclThis module exploits an array overflow in Adobe Reader and Adobe Acrobat. Affected versions include < 7.1.4, < 8.2, and < 9.3. By creating a specially crafted pdf that a contains malformed U3D data, an attacker may be able to execute arbitrary code. Au
CVSS scores for CVE-2009-3953
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST | |
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST | 2024-12-19 |
CWE ids for CVE-2009-3953
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
-
The product writes data past the end, or before the beginning, of the intended buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2009-3953
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/55551
Third Party Advisory;VDB Entry
-
http://www.redhat.com/support/errata/RHSA-2010-0060.html
SupportBroken Link
-
http://www.vupen.com/english/advisories/2010/0103
Broken Link;Vendor Advisory
-
http://www.adobe.com/support/security/bulletins/apsb10-02.html
Adobe - Security Bulletin APSB10-02 Security updates available for Adobe Reader and AcrobatNot Applicable;Patch;Vendor Advisory
-
http://osvdb.org/61690
Broken Link
-
http://www.us-cert.gov/cas/techalerts/TA10-013A.html
Third Party Advisory;US Government Resource
-
http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html
[security-announce] SUSE Security Announcement: acoread (SUSE-SA:2010:00Mailing List;Third Party Advisory
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8242
404 Not FoundBroken Link
-
http://secunia.com/advisories/38215
About Secunia Research | FlexeraBroken Link
-
http://www.securityfocus.com/bid/37758
Broken Link;Third Party Advisory;VDB Entry
-
https://bugzilla.redhat.com/show_bug.cgi?id=554293
554293 – (CVE-2009-3953, CVE-2009-3954, CVE-2009-3955, CVE-2009-3958, CVE-2009-3959) CVE-2009-3953 CVE-2009-3954 CVE-2009-3955 CVE-2009-3959 acroread: multiple code execution flaws (APSB10-02)Issue Tracking
-
http://www.securitytracker.com/id?1023446
Access DeniedBroken Link;Third Party Advisory;VDB Entry
-
http://secunia.com/advisories/38138
Broken Link
-
http://www.metasploit.com/modules/exploit/windows/fileformat/adobe_u3d_meshdecl
Third Party Advisory
Jump to