Vulnerability Details CVE-2008-2042
The Javascript API in Adobe Acrobat Professional 7.0.9 and possibly 8.1.1 exposes a dangerous method, which allows remote attackers to execute arbitrary commands or trigger a buffer overflow via a crafted PDF file that invokes app.checkForUpdate with a malicious callback function.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.045
EPSS Ranking 88.6%
CVSS Severity
CVSS v2 Score 9.3
Products affected by CVE-2008-2042
-
cpe:2.3:a:adobe:acrobat:-
-
cpe:2.3:a:adobe:acrobat:1.0
-
cpe:2.3:a:adobe:acrobat:2.0
-
cpe:2.3:a:adobe:acrobat:3.0
-
cpe:2.3:a:adobe:acrobat:3.1
-
cpe:2.3:a:adobe:acrobat:4.0
-
cpe:2.3:a:adobe:acrobat:4.0.5
-
cpe:2.3:a:adobe:acrobat:4.0.5a
-
cpe:2.3:a:adobe:acrobat:4.0.5c
-
cpe:2.3:a:adobe:acrobat:5.0
-
cpe:2.3:a:adobe:acrobat:5.0.10
-
cpe:2.3:a:adobe:acrobat:5.0.5
-
cpe:2.3:a:adobe:acrobat:5.0.6
-
cpe:2.3:a:adobe:acrobat:5.1
-
cpe:2.3:a:adobe:acrobat:6.0
-
cpe:2.3:a:adobe:acrobat:6.0.1
-
cpe:2.3:a:adobe:acrobat:6.0.2
-
cpe:2.3:a:adobe:acrobat:6.0.3
-
cpe:2.3:a:adobe:acrobat:6.0.4
-
cpe:2.3:a:adobe:acrobat:6.0.5
-
cpe:2.3:a:adobe:acrobat:6.0.6
-
cpe:2.3:a:adobe:acrobat:7
-
cpe:2.3:a:adobe:acrobat:7.0
-
cpe:2.3:a:adobe:acrobat:7.0.1
-
cpe:2.3:a:adobe:acrobat:7.0.2
-
cpe:2.3:a:adobe:acrobat:7.0.3
-
cpe:2.3:a:adobe:acrobat:7.0.4
-
cpe:2.3:a:adobe:acrobat:7.0.5
-
cpe:2.3:a:adobe:acrobat:7.0.6
-
cpe:2.3:a:adobe:acrobat:7.0.7
-
cpe:2.3:a:adobe:acrobat:7.0.8
-
cpe:2.3:a:adobe:acrobat:7.0.9
-
cpe:2.3:a:adobe:acrobat:7.1.0
-
cpe:2.3:a:adobe:acrobat:7.1.1
-
cpe:2.3:a:adobe:acrobat:7.1.2
-
cpe:2.3:a:adobe:acrobat:7.1.3
-
cpe:2.3:a:adobe:acrobat:7.1.4
-
cpe:2.3:a:adobe:acrobat:8
-
cpe:2.3:a:adobe:acrobat:8.0
-
cpe:2.3:a:adobe:acrobat:8.0.0
-
cpe:2.3:a:adobe:acrobat:8.1
-
cpe:2.3:a:adobe:acrobat:8.1.1
-
cpe:2.3:a:adobe:acrobat:_reader9.5.3
-
cpe:2.3:a:adobe:acrobat_reader:-
-
cpe:2.3:a:adobe:acrobat_reader:3.0
-
cpe:2.3:a:adobe:acrobat_reader:3.01
-
cpe:2.3:a:adobe:acrobat_reader:3.02
-
cpe:2.3:a:adobe:acrobat_reader:4.0
-
cpe:2.3:a:adobe:acrobat_reader:4.0.5
-
cpe:2.3:a:adobe:acrobat_reader:4.0.5a
-
cpe:2.3:a:adobe:acrobat_reader:4.0.5c
-
cpe:2.3:a:adobe:acrobat_reader:4.5
-
cpe:2.3:a:adobe:acrobat_reader:5.0
-
cpe:2.3:a:adobe:acrobat_reader:5.0.10
-
cpe:2.3:a:adobe:acrobat_reader:5.0.11
-
cpe:2.3:a:adobe:acrobat_reader:5.0.5
-
cpe:2.3:a:adobe:acrobat_reader:5.0.6
-
cpe:2.3:a:adobe:acrobat_reader:5.0.7
-
cpe:2.3:a:adobe:acrobat_reader:5.0.9
-
cpe:2.3:a:adobe:acrobat_reader:5.1
-
cpe:2.3:a:adobe:acrobat_reader:6.0
-
cpe:2.3:a:adobe:acrobat_reader:6.0.1
-
cpe:2.3:a:adobe:acrobat_reader:6.0.2
-
cpe:2.3:a:adobe:acrobat_reader:6.0.3
-
cpe:2.3:a:adobe:acrobat_reader:6.0.4
-
cpe:2.3:a:adobe:acrobat_reader:6.0.5
-
cpe:2.3:a:adobe:acrobat_reader:6.0.6
-
cpe:2.3:a:adobe:acrobat_reader:7.0
-
cpe:2.3:a:adobe:acrobat_reader:7.0.1
-
cpe:2.3:a:adobe:acrobat_reader:7.0.2
-
cpe:2.3:a:adobe:acrobat_reader:7.0.3
-
cpe:2.3:a:adobe:acrobat_reader:7.0.4
-
cpe:2.3:a:adobe:acrobat_reader:7.0.5
-
cpe:2.3:a:adobe:acrobat_reader:7.0.6
-
cpe:2.3:a:adobe:acrobat_reader:7.0.7
-
cpe:2.3:a:adobe:acrobat_reader:7.0.8
-
cpe:2.3:a:adobe:acrobat_reader:7.0.9
-
cpe:2.3:a:adobe:acrobat_reader:7.1.0
-
cpe:2.3:a:adobe:acrobat_reader:7.1.1
-
cpe:2.3:a:adobe:acrobat_reader:7.1.2
-
cpe:2.3:a:adobe:acrobat_reader:7.1.3
-
cpe:2.3:a:adobe:acrobat_reader:7.1.4
-
cpe:2.3:a:adobe:acrobat_reader:8.0
-
cpe:2.3:a:adobe:acrobat_reader:8.1
-
cpe:2.3:a:adobe:acrobat_reader:8.1.1