CVE-2008-2992

CVSS V2 High 9.3 CVSS V3 None
Description
Stack-based buffer overflow in Adobe Acrobat and Reader 8.1.2 and earlier allows remote attackers to execute arbitrary code via a PDF file that calls the util.printf JavaScript function with a crafted format string argument, a related issue to CVE-2008-1104.
Overview
  • CVE ID
  • CVE-2008-2992
  • Assigner
  • cve@mitre.org
  • Vulnerability Status
  • Modified
  • Published Version
  • 2008-11-04T18:29:47
  • Last Modified Date
  • 2018-10-30T16:25:16
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:* 1 OR 8.1.2
cpe:2.3:a:adobe:acrobat:3.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat:3.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat:4.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat:4.0.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat:4.0.5a:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat:4.0.5c:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat:5.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat:5.0.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat:5.0.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat:5.0.10:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat:6.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat:6.0.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat:6.0.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat:6.0.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat:6.0.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat:6.0.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat:7.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat:7.0.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat:7.0.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat:7.0.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat:7.0.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat:7.0.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat:7.0.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat:7.0.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat:7.0.8:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat:7.0.9:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat:8.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat:8.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat:8.1.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:* 1 OR 8.1.2
cpe:2.3:a:adobe:acrobat_reader:3.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat_reader:4.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat_reader:4.0.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat_reader:4.0.5a:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat_reader:4.0.5c:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat_reader:4.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat_reader:5.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat_reader:5.0.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat_reader:5.0.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat_reader:5.0.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat_reader:5.0.9:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat_reader:5.0.10:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat_reader:5.0.11:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat_reader:5.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat_reader:6.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat_reader:6.0.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat_reader:6.0.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat_reader:6.0.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat_reader:6.0.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat_reader:6.0.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat_reader:7.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat_reader:7.0.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat_reader:7.0.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat_reader:7.0.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat_reader:7.0.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat_reader:7.0.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat_reader:7.0.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat_reader:7.0.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat_reader:7.0.8:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat_reader:7.0.9:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat_reader:8.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat_reader:8.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:adobe:acrobat_reader:8.1.1:*:*:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:M/Au:N/C:C/I:C/A:C
  • Access Vector
  • NETWORK
  • Access Compatibility
  • MEDIUM
  • Authentication
  • NONE
  • Confidentiality Impact
  • COMPLETE
  • Integrity Impact
  • COMPLETE
  • Availability Impact
  • COMPLETE
  • Base Score
  • 9.3
  • Severity
  • HIGH
  • Exploitability Score
  • 8.6
  • Impact Score
  • 10
References
Reference URL Reference Tags
http://www.securityfocus.com/bid/32091
http://www.coresecurity.com/content/adobe-reader-buffer-overflow
http://secunia.com/advisories/29773 Vendor Advisory
http://secunia.com/secunia_research/2008-14/ Vendor Advisory
http://www.zerodayinitiative.com/advisories/ZDI-08-072/
http://www.adobe.com/support/security/bulletins/apsb08-19.html Patch Vendor Advisory
http://www.securityfocus.com/bid/30035
http://www.us-cert.gov/cas/techalerts/TA08-309A.html US Government Resource
http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00002.html
http://secunia.com/advisories/32872 Vendor Advisory
http://secunia.com/advisories/32700 Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2008-0974.html Patch
http://securityreason.com/securityalert/4549 Exploit
http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=800801
http://www.kb.cert.org/vuls/id/593409 US Government Resource
http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=909609
http://secunia.com/advisories/35163 Vendor Advisory
http://www.vupen.com/english/advisories/2009/0098 Vendor Advisory
http://www.vupen.com/english/advisories/2008/3001 Vendor Advisory
http://www.securitytracker.com/id?1021140
http://download.oracle.com/sunalerts/1019937.1.html
http://osvdb.org/49520
https://www.exploit-db.com/exploits/7006
https://www.exploit-db.com/exploits/6994
http://www.securityfocus.com/archive/1/498055/100/0/threaded
http://www.securityfocus.com/archive/1/498032/100/0/threaded
http://www.securityfocus.com/archive/1/498027/100/0/threaded
History
Created Old Value New Value Data Type Notes
2022-05-10 18:01:56 Added to TrackCVE