Unrated severityNVD Advisory· Published May 8, 2008· Updated Apr 23, 2026
CVE-2008-2042
CVE-2008-2042
Description
The Javascript API in Adobe Acrobat Professional 7.0.9 and possibly 8.1.1 exposes a dangerous method, which allows remote attackers to execute arbitrary commands or trigger a buffer overflow via a crafted PDF file that invokes app.checkForUpdate with a malicious callback function.
Affected products
76cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*+ 34 more
- cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*range: <=8.1.1
- cpe:2.3:a:adobe:acrobat:3.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:3.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:4.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:4.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:4.0.5a:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:4.0.5c:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:5.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:5.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:5.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:5.0.10:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:6.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:6.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:6.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:6.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:6.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:6.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:6.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:7.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:7.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:7.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:7.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:7.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:7.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:7.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:7.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:7.0.8:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:7.0.9:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:7.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:7.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:7.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:7.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:7.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:8.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:8.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*+ 40 more
- cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*range: <=8.1.1
- cpe:2.3:a:adobe:acrobat_reader:3.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:3.01:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:3.02:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:4.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:4.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:4.0.5a:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:4.0.5c:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:4.5:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:5.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:5.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:5.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:5.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:5.0.9:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:5.0.10:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:5.0.11:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:5.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:6.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:6.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:6.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:6.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:6.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:6.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:6.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:7.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:7.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:7.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:7.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:7.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:7.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:7.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:7.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:7.0.8:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:7.0.9:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:7.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:7.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:7.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:7.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:7.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:8.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:8.1:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
8- secunia.com/advisories/30840nvdVendor Advisory
- www.adobe.com/support/security/bulletins/apsb08-13.htmlnvdVendor Advisory
- securityreason.com/securityalert/3861nvd
- securitytracker.com/idnvd
- sunsolve.sun.com/search/document.donvd
- www.securityfocus.com/archive/1/491735/100/0/threadednvd
- www.vupen.com/english/advisories/2008/1966/referencesnvd
- exchange.xforce.ibmcloud.com/vulnerabilities/42237nvd
News mentions
0No linked articles in our index yet.