cpe:/a:adobe:acrobat:7.0 cpe:/a:adobe:acrobat:7.0::professional cpe:/a:adobe:acrobat:7.0::standard cpe:/a:adobe:acrobat:7.0.1 cpe:/a:adobe:acrobat:7.0.1::professional cpe:/a:adobe:acrobat:7.0.1::standard cpe:/a:adobe:acrobat:7.0.2 cpe:/a:adobe:acrobat:7.0.2::professional cpe:/a:adobe:acrobat:7.0.2::standard cpe:/a:adobe:acrobat:7.0.3 cpe:/a:adobe:acrobat:7.0.3::professional cpe:/a:adobe:acrobat:7.0.3::standard cpe:/a:adobe:acrobat:7.0.4 cpe:/a:adobe:acrobat:7.0.4::professional cpe:/a:adobe:acrobat:7.0.4::standard cpe:/a:adobe:acrobat:7.0.5 cpe:/a:adobe:acrobat:7.0.5::professional cpe:/a:adobe:acrobat:7.0.5::standard cpe:/a:adobe:acrobat:7.0.6 cpe:/a:adobe:acrobat:7.0.6::professional cpe:/a:adobe:acrobat:7.0.6::standard cpe:/a:adobe:acrobat:7.0.7 cpe:/a:adobe:acrobat:7.0.7::professional cpe:/a:adobe:acrobat:7.0.7::standard cpe:/a:adobe:acrobat:7.0.8 cpe:/a:adobe:acrobat:7.0.8::elements cpe:/a:adobe:acrobat:7.0.8::professional cpe:/a:adobe:acrobat:7.0.8::standard cpe:/a:adobe:acrobat:7.0.9 cpe:/a:adobe:acrobat:7.0.9::professional cpe:/a:adobe:acrobat:7.1 cpe:/a:adobe:acrobat:7.1::professional cpe:/a:adobe:acrobat:7.1::standard cpe:/a:adobe:acrobat:7.1.0 cpe:/a:adobe:acrobat:7.1.1 cpe:/a:adobe:acrobat:7.1.1::standard cpe:/a:adobe:acrobat:8.0 cpe:/a:adobe:acrobat:8.0::professional cpe:/a:adobe:acrobat:8.0::standard cpe:/a:adobe:acrobat:8.1 cpe:/a:adobe:acrobat:8.1::standard cpe:/a:adobe:acrobat:8.1.1 cpe:/a:adobe:acrobat:8.1.1::professional cpe:/a:adobe:acrobat:8.1.1::standard cpe:/a:adobe:acrobat:8.1.2 cpe:/a:adobe:acrobat:8.1.2::professional cpe:/a:adobe:acrobat:8.1.2::standard cpe:/a:adobe:acrobat:8.1.2:security_update:professional cpe:/a:adobe:acrobat:8.1.3 cpe:/a:adobe:acrobat:8.1.3::professional cpe:/a:adobe:acrobat:8.1.3::standard cpe:/a:adobe:acrobat:8.1.4 cpe:/a:adobe:acrobat:8.1.4::professional cpe:/a:adobe:acrobat:8.1.4::standard cpe:/a:adobe:acrobat:9 cpe:/a:adobe:acrobat:9.0 cpe:/a:adobe:acrobat:9.0::standard cpe:/a:adobe:acrobat:9.0.0 cpe:/a:adobe:acrobat:9.1 cpe:/a:adobe:acrobat:9.1::standard cpe:/a:adobe:acrobat_reader:7.0 cpe:/a:adobe:acrobat_reader:7.0.1 cpe:/a:adobe:acrobat_reader:7.0.2 cpe:/a:adobe:acrobat_reader:7.0.3 cpe:/a:adobe:acrobat_reader:7.0.4 cpe:/a:adobe:acrobat_reader:7.0.5 cpe:/a:adobe:acrobat_reader:7.0.6 cpe:/a:adobe:acrobat_reader:7.0.7 cpe:/a:adobe:acrobat_reader:7.0.8 cpe:/a:adobe:acrobat_reader:7.0.9 cpe:/a:adobe:acrobat_reader:7.1 cpe:/a:adobe:acrobat_reader:7.1.1 cpe:/a:adobe:acrobat_reader:8.0 cpe:/a:adobe:acrobat_reader:8.1 cpe:/a:adobe:acrobat_reader:8.1.1 cpe:/a:adobe:acrobat_reader:8.1.2 cpe:/a:adobe:acrobat_reader:8.1.2:security_update cpe:/a:adobe:acrobat_reader:8.1.3 cpe:/a:adobe:acrobat_reader:8.1.4 cpe:/a:adobe:acrobat_reader:8.1.5 cpe:/a:adobe:acrobat_reader:9 cpe:/a:adobe:acrobat_reader:9.1 cpe:/a:adobe:acrobat_reader:9.1.1 cpe:/a:adobe:acrobat_reader:9.1.2 cpe:/a:adobe:acrobat_reader:9.1.3 CVE-2009-3431 2009-09-25T19:30:02.453-04:00 2017-09-18T21:29:37.233-04:00 5.0 NETWORK LOW NONE NONE NONE PARTIAL http://nvd.nist.gov 2009-09-28T11:42:00.000-04:00 SECTRACK 1023007 BID 35148 VUPEN ADV-2009-2898 CERT TA09-286B CONFIRM http://www.adobe.com/support/security/bulletins/apsb09-15.html Stack consumption vulnerability in Adobe Reader and Acrobat 9.1.3, 9.1.2, 9.1.1, and earlier 9.x versions; 8.1.6 and earlier 8.x versions; and possibly 7.1.4 and earlier 7.x versions allows remote attackers to cause a denial of service (application crash) via a PDF file with a large number of [ (open square bracket) characters in the argument to the alert method. NOTE: some of these details are obtained from third party information.