Use-after-free vulnerability in the Doc.media.newPlayer method in Multimedia.api in Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, allows remote attackers to execute arbitrary code via a crafted PDF file using ZLib compressed streams, as exploited in the wild in December 2009.
History

Wed, 22 Oct 2025 01:30:00 +0000


Tue, 21 Oct 2025 20:30:00 +0000


Tue, 21 Oct 2025 19:30:00 +0000


Mon, 14 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.93425}

epss

{'score': 0.93381}


Sat, 12 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.93498}

epss

{'score': 0.93425}


Tue, 04 Feb 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics kev

{'dateAdded': '2022-06-08'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'active', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 13 Aug 2024 23:15:00 +0000

Type Values Removed Values Added
References

cve-icon MITRE

Status: PUBLISHED

Assigner: adobe

Published: 2009-12-15T02:00:00.000Z

Updated: 2025-10-22T00:05:53.934Z

Reserved: 2009-12-14T00:00:00.000Z

Link: CVE-2009-4324

cve-icon Vulnrichment

Updated: 2024-08-07T07:01:20.249Z

cve-icon NVD

Status : Deferred

Published: 2009-12-15T02:30:00.217

Modified: 2025-10-22T01:15:35.287

Link: CVE-2009-4324

cve-icon Redhat

Severity : Critical

Publid Date: 2009-12-14T00:00:00Z

Links: CVE-2009-4324 - Bugzilla