High severity7.8NVD Advisory· Published Feb 20, 2009· Updated Apr 23, 2026
CVE-2009-0658
CVE-2009-0658
Description
Buffer overflow in Adobe Reader 9.0 and earlier, and Acrobat 9.0 and earlier, allows remote attackers to execute arbitrary code via a crafted PDF document, related to a non-JavaScript function call and possibly an embedded JBIG2 image stream, as exploited in the wild in February 2009 by Trojan.Pidief.E.
Affected products
4cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*range: >=7.0,<=7.1.1
- cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*range: >=7.0,<=7.1.1
- cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
26- isc.sans.org/diary.htmlnvdThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2009-03/msg00005.htmlnvdThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.htmlnvdThird Party Advisory
- secunia.com/advisories/33901nvdThird Party Advisory
- secunia.com/advisories/34392nvdThird Party Advisory
- secunia.com/advisories/34490nvdThird Party Advisory
- secunia.com/advisories/34706nvdThird Party Advisory
- secunia.com/advisories/34790nvdThird Party Advisory
- security.gentoo.org/glsa/glsa-200904-17.xmlnvdThird Party Advisory
- sunsolve.sun.com/search/document.donvdThird Party Advisory
- www.adobe.com/support/security/advisories/apsa09-01.htmlnvdVendor Advisory
- www.adobe.com/support/security/bulletins/apsb09-04.htmlnvdVendor Advisory
- www.kb.cert.org/vuls/id/905281nvdThird Party AdvisoryUS Government Resource
- www.redhat.com/support/errata/RHSA-2009-0376.htmlnvdThird Party Advisory
- www.securityfocus.com/bid/33751nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/idnvdThird Party AdvisoryVDB Entry
- www.shadowserver.org/wiki/pmwiki.phpnvdThird Party Advisory
- www.symantec.com/security_response/writeup.jspnvdThird Party Advisory
- www.us-cert.gov/cas/techalerts/TA09-051A.htmlnvdThird Party AdvisoryUS Government Resource
- www.vupen.com/english/advisories/2009/0472nvdThird Party Advisory
- www.vupen.com/english/advisories/2009/1019nvdThird Party Advisory
- www.exploit-db.com/exploits/8090nvdThird Party AdvisoryVDB Entry
- www.exploit-db.com/exploits/8099nvdThird Party AdvisoryVDB Entry
- osvdb.org/52073nvdBroken Link
- exchange.xforce.ibmcloud.com/vulnerabilities/48825nvdVDB Entry
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5697nvdTool Signature
News mentions
0No linked articles in our index yet.