Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2010-2883
Vulnerability from cvelistv5
CISA Known exploited vulnerability
Data from the Known Exploited Vulnerabilities Catalog
Date added: 2022-06-08
Due date: 2022-06-22
Required action: Apply updates per vendor instructions.
Used in ransomware: Unknown
Notes: https://nvd.nist.gov/vuln/detail/CVE-2010-2883
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:46:48.714Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SUSE-SA:2010:048", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00001.html" }, { "name": "ADV-2011-0191", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0191" }, { "name": "oval:org.mitre.oval:def:11586", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11586" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/advisories/apsa10-02.html" }, { "name": "43025", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43025" }, { "name": "ADV-2011-0344", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0344" }, { "name": "GLSA-201101-08", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201101-08.xml" }, { "name": "ADV-2010-2331", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/2331" }, { "name": "VU#491991", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/491991" }, { "name": "RHSA-2010:0743", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0743.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-21.html" }, { "name": "TA10-279A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA10-279A.html" }, { "name": "41340", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/41340" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://community.websense.com/blogs/securitylabs/archive/2010/09/10/brief-analysis-on-adobe-reader-sing-table-parsing-vulnerability-cve-2010-2883.aspx" }, { "name": "adobe-reader-cooltype-code-execution(61635)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61635" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://blog.metasploit.com/2010/09/return-of-unpublished-adobe.html" }, { "name": "43057", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/43057" }, { "name": "TLSA-2011-2", "tags": [ "vendor-advisory", "x_refsource_TURBO", "x_transferred" ], "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-2j.txt" }, { "name": "SUSE-SR:2010:019", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-09-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in CoolType.dll in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a PDF document with a long field in a Smart INdependent Glyphlets (SING) table in a TTF font, as exploited in the wild in September 2010. NOTE: some of these details are obtained from third party information." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "SUSE-SA:2010:048", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00001.html" }, { "name": "ADV-2011-0191", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0191" }, { "name": "oval:org.mitre.oval:def:11586", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11586" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/advisories/apsa10-02.html" }, { "name": "43025", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43025" }, { "name": "ADV-2011-0344", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0344" }, { "name": "GLSA-201101-08", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201101-08.xml" }, { "name": "ADV-2010-2331", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/2331" }, { "name": "VU#491991", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/491991" }, { "name": "RHSA-2010:0743", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0743.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-21.html" }, { "name": "TA10-279A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA10-279A.html" }, { "name": "41340", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/41340" }, { "tags": [ "x_refsource_MISC" ], "url": "http://community.websense.com/blogs/securitylabs/archive/2010/09/10/brief-analysis-on-adobe-reader-sing-table-parsing-vulnerability-cve-2010-2883.aspx" }, { "name": "adobe-reader-cooltype-code-execution(61635)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61635" }, { "tags": [ "x_refsource_MISC" ], "url": "http://blog.metasploit.com/2010/09/return-of-unpublished-adobe.html" }, { "name": "43057", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/43057" }, { "name": "TLSA-2011-2", "tags": [ "vendor-advisory", "x_refsource_TURBO" ], "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-2j.txt" }, { "name": "SUSE-SR:2010:019", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-2883", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in CoolType.dll in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a PDF document with a long field in a Smart INdependent Glyphlets (SING) table in a TTF font, as exploited in the wild in September 2010. NOTE: some of these details are obtained from third party information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "SUSE-SA:2010:048", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00001.html" }, { "name": "ADV-2011-0191", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0191" }, { "name": "oval:org.mitre.oval:def:11586", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11586" }, { "name": "http://www.adobe.com/support/security/advisories/apsa10-02.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/advisories/apsa10-02.html" }, { "name": "43025", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/43025" }, { "name": "ADV-2011-0344", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0344" }, { "name": "GLSA-201101-08", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201101-08.xml" }, { "name": "ADV-2010-2331", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/2331" }, { "name": "VU#491991", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/491991" }, { "name": "RHSA-2010:0743", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2010-0743.html" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-21.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-21.html" }, { "name": "TA10-279A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA10-279A.html" }, { "name": "41340", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/41340" }, { "name": "http://community.websense.com/blogs/securitylabs/archive/2010/09/10/brief-analysis-on-adobe-reader-sing-table-parsing-vulnerability-cve-2010-2883.aspx", "refsource": "MISC", "url": "http://community.websense.com/blogs/securitylabs/archive/2010/09/10/brief-analysis-on-adobe-reader-sing-table-parsing-vulnerability-cve-2010-2883.aspx" }, { "name": "adobe-reader-cooltype-code-execution(61635)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61635" }, { "name": "http://blog.metasploit.com/2010/09/return-of-unpublished-adobe.html", "refsource": "MISC", "url": "http://blog.metasploit.com/2010/09/return-of-unpublished-adobe.html" }, { "name": "43057", "refsource": "BID", "url": "http://www.securityfocus.com/bid/43057" }, { "name": "TLSA-2011-2", "refsource": "TURBO", "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-2j.txt" }, { "name": "SUSE-SR:2010:019", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-2883", "datePublished": "2010-09-09T21:00:00", "dateReserved": "2010-07-27T00:00:00", "dateUpdated": "2024-08-07T02:46:48.714Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "cisa_known_exploited": { "cveID": "CVE-2010-2883", "cwes": "[\"CWE-119\"]", "dateAdded": "2022-06-08", "dueDate": "2022-06-22", "knownRansomwareCampaignUse": "Unknown", "notes": "https://nvd.nist.gov/vuln/detail/CVE-2010-2883", "product": "Acrobat and Reader", "requiredAction": "Apply updates per vendor instructions.", "shortDescription": "Adobe Acrobat and Reader contain a stack-based buffer overflow vulnerability that allows remote attackers to execute code or cause denial-of-service (DoS).", "vendorProject": "Adobe", "vulnerabilityName": "Adobe Acrobat and Reader Stack-Based Buffer Overflow Vulnerability" }, "nvd": "{\"cve\":{\"id\":\"CVE-2010-2883\",\"sourceIdentifier\":\"psirt@adobe.com\",\"published\":\"2010-09-09T22:00:02.250\",\"lastModified\":\"2024-12-19T18:19:37.077\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Stack-based buffer overflow in CoolType.dll in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a PDF document with a long field in a Smart INdependent Glyphlets (SING) table in a TTF font, as exploited in the wild in September 2010. NOTE: some of these details are obtained from third party information.\"},{\"lang\":\"es\",\"value\":\"Un desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria en la biblioteca CoolType.dll en Adobe Reader y Acrobat versi\u00f3n 9.x anterior a 9.4 y versi\u00f3n 8.x anterior a 8.2.5 en Windows y Mac OS X, permite a los atacantes remotos ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (bloqueo de aplicaci\u00f3n) por medio de un documento PDF con un campo largo en una tabla Smart INdependent Glyphlets (SING) en una fuente TTF, tal y como se explot\u00f3 \u201cin the wild\u201d en septiembre de 2010. NOTA: algunos de estos datos se consiguen de la informaci\u00f3n de terceros.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":7.3,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.3,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:C/I:C/A:C\",\"baseScore\":9.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.6,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"cisaExploitAdd\":\"2022-06-08\",\"cisaActionDue\":\"2022-06-22\",\"cisaRequiredAction\":\"Apply updates per vendor instructions.\",\"cisaVulnerabilityName\":\"Adobe Acrobat and Reader Stack-Based Buffer Overflow Vulnerability\",\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"8.0\",\"versionEndExcluding\":\"8.2.5\",\"matchCriteriaId\":\"38C52D23-D5BD-4325-ABA9-FA14F07AF54F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"9.0\",\"versionEndExcluding\":\"9.4\",\"matchCriteriaId\":\"EAC4A665-19CA-495D-A00F-6B42EA627E0F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"387021A0-AF36-463C-A605-32EA7DAC172E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2572D17-1DE6-457B-99CC-64AFD54487EA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"8.0\",\"versionEndExcluding\":\"8.2.5\",\"matchCriteriaId\":\"B742E5CB-5047-4E30-BE12-B5C3EB428503\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"9.0\",\"versionEndExcluding\":\"9.4\",\"matchCriteriaId\":\"49CF11ED-51D6-4376-8AB3-B062EFAE945F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"387021A0-AF36-463C-A605-32EA7DAC172E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2572D17-1DE6-457B-99CC-64AFD54487EA\"}]}]}],\"references\":[{\"url\":\"http://blog.metasploit.com/2010/09/return-of-unpublished-adobe.html\",\"source\":\"psirt@adobe.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://community.websense.com/blogs/securitylabs/archive/2010/09/10/brief-analysis-on-adobe-reader-sing-table-parsing-vulnerability-cve-2010-2883.aspx\",\"source\":\"psirt@adobe.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00001.html\",\"source\":\"psirt@adobe.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html\",\"source\":\"psirt@adobe.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/41340\",\"source\":\"psirt@adobe.com\",\"tags\":[\"Broken Link\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/43025\",\"source\":\"psirt@adobe.com\",\"tags\":[\"Broken Link\",\"Vendor Advisory\"]},{\"url\":\"http://security.gentoo.org/glsa/glsa-201101-08.xml\",\"source\":\"psirt@adobe.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.adobe.com/support/security/advisories/apsa10-02.html\",\"source\":\"psirt@adobe.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.adobe.com/support/security/bulletins/apsb10-21.html\",\"source\":\"psirt@adobe.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/491991\",\"source\":\"psirt@adobe.com\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0743.html\",\"source\":\"psirt@adobe.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.securityfocus.com/bid/43057\",\"source\":\"psirt@adobe.com\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.turbolinux.co.jp/security/2011/TLSA-2011-2j.txt\",\"source\":\"psirt@adobe.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA10-279A.html\",\"source\":\"psirt@adobe.com\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.vupen.com/english/advisories/2010/2331\",\"source\":\"psirt@adobe.com\",\"tags\":[\"Broken Link\",\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2011/0191\",\"source\":\"psirt@adobe.com\",\"tags\":[\"Broken Link\",\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2011/0344\",\"source\":\"psirt@adobe.com\",\"tags\":[\"Broken Link\",\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/61635\",\"source\":\"psirt@adobe.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11586\",\"source\":\"psirt@adobe.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://blog.metasploit.com/2010/09/return-of-unpublished-adobe.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://community.websense.com/blogs/securitylabs/archive/2010/09/10/brief-analysis-on-adobe-reader-sing-table-parsing-vulnerability-cve-2010-2883.aspx\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/41340\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/43025\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Vendor Advisory\"]},{\"url\":\"http://security.gentoo.org/glsa/glsa-201101-08.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.adobe.com/support/security/advisories/apsa10-02.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.adobe.com/support/security/bulletins/apsb10-21.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/491991\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0743.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.securityfocus.com/bid/43057\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.turbolinux.co.jp/security/2011/TLSA-2011-2j.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA10-279A.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.vupen.com/english/advisories/2010/2331\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2011/0191\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2011/0344\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/61635\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11586\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]}],\"evaluatorSolution\":\"Per: http://www.adobe.com/support/security/advisories/apsa10-02.html\\r\\n\\r\\n\u0027Adobe is in the process of evaluating the schedule for an update to resolve this vulnerability.\u0027\",\"evaluatorImpact\":\"Per: http://www.adobe.com/support/security/advisories/apsa10-02.html\\r\\n\\r\\n\\r\\n\u0027Affected software versions\\r\\n\\r\\nAdobe Reader 9.3.4 and earlier versions for Windows, Macintosh and UNIX, and Adobe Acrobat 9.3.4 and earlier versions for Windows and Macintosh.\u0027\"}}" } }
gsd-2010-2883
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2010-2883", "description": "Stack-based buffer overflow in CoolType.dll in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a PDF document with a long field in a Smart INdependent Glyphlets (SING) table in a TTF font, as exploited in the wild in September 2010. NOTE: some of these details are obtained from third party information.", "id": "GSD-2010-2883", "references": [ "https://www.suse.com/security/cve/CVE-2010-2883.html", "https://access.redhat.com/errata/RHSA-2010:0743", "https://packetstormsecurity.com/files/cve/CVE-2010-2883" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2010-2883" ], "details": "Stack-based buffer overflow in CoolType.dll in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a PDF document with a long field in a Smart INdependent Glyphlets (SING) table in a TTF font, as exploited in the wild in September 2010. NOTE: some of these details are obtained from third party information.", "id": "GSD-2010-2883", "modified": "2023-12-13T01:21:31.456806Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-2883", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in CoolType.dll in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a PDF document with a long field in a Smart INdependent Glyphlets (SING) table in a TTF font, as exploited in the wild in September 2010. NOTE: some of these details are obtained from third party information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "SUSE-SA:2010:048", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00001.html" }, { "name": "ADV-2011-0191", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0191" }, { "name": "oval:org.mitre.oval:def:11586", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11586" }, { "name": "http://www.adobe.com/support/security/advisories/apsa10-02.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/advisories/apsa10-02.html" }, { "name": "43025", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/43025" }, { "name": "ADV-2011-0344", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0344" }, { "name": "GLSA-201101-08", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201101-08.xml" }, { "name": "ADV-2010-2331", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/2331" }, { "name": "VU#491991", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/491991" }, { "name": "RHSA-2010:0743", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2010-0743.html" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-21.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-21.html" }, { "name": "TA10-279A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA10-279A.html" }, { "name": "41340", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/41340" }, { "name": "http://community.websense.com/blogs/securitylabs/archive/2010/09/10/brief-analysis-on-adobe-reader-sing-table-parsing-vulnerability-cve-2010-2883.aspx", "refsource": "MISC", "url": "http://community.websense.com/blogs/securitylabs/archive/2010/09/10/brief-analysis-on-adobe-reader-sing-table-parsing-vulnerability-cve-2010-2883.aspx" }, { "name": "adobe-reader-cooltype-code-execution(61635)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61635" }, { "name": "http://blog.metasploit.com/2010/09/return-of-unpublished-adobe.html", "refsource": "MISC", "url": "http://blog.metasploit.com/2010/09/return-of-unpublished-adobe.html" }, { "name": "43057", "refsource": "BID", "url": "http://www.securityfocus.com/bid/43057" }, { "name": "TLSA-2011-2", "refsource": "TURBO", "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-2j.txt" }, { "name": "SUSE-SR:2010:019", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:8.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:8.1.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:8.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:8.1.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:8.1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "9.3.4", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:9.3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:8.2.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:8.1.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:9.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:9.3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:9.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:9.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:9.1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:8.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:8.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:8.1.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:8.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:8.1.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:a:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:9.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "9.3.4", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:9.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:9.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:8.2.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:8.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:8.1.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:8.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:8.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:9.3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:9.3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:8.1.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:8.1.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:8.1.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:8.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:9.1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:8.1.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:8.2.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-2883" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Stack-based buffer overflow in CoolType.dll in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a PDF document with a long field in a Smart INdependent Glyphlets (SING) table in a TTF font, as exploited in the wild in September 2010. NOTE: some of these details are obtained from third party information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-119" } ] } ] }, "references": { "reference_data": [ { "name": "http://blog.metasploit.com/2010/09/return-of-unpublished-adobe.html", "refsource": "MISC", "tags": [], "url": "http://blog.metasploit.com/2010/09/return-of-unpublished-adobe.html" }, { "name": "http://www.adobe.com/support/security/advisories/apsa10-02.html", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/advisories/apsa10-02.html" }, { "name": "41340", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/41340" }, { "name": "43057", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/43057" }, { "name": "ADV-2010-2331", "refsource": "VUPEN", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/2331" }, { "name": "VU#491991", "refsource": "CERT-VN", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/491991" }, { "name": "http://community.websense.com/blogs/securitylabs/archive/2010/09/10/brief-analysis-on-adobe-reader-sing-table-parsing-vulnerability-cve-2010-2883.aspx", "refsource": "MISC", "tags": [], "url": "http://community.websense.com/blogs/securitylabs/archive/2010/09/10/brief-analysis-on-adobe-reader-sing-table-parsing-vulnerability-cve-2010-2883.aspx" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-21.html", "refsource": "CONFIRM", "tags": [], "url": "http://www.adobe.com/support/security/bulletins/apsb10-21.html" }, { "name": "SUSE-SA:2010:048", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00001.html" }, { "name": "RHSA-2010:0743", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0743.html" }, { "name": "TA10-279A", "refsource": "CERT", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA10-279A.html" }, { "name": "SUSE-SR:2010:019", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" }, { "name": "GLSA-201101-08", "refsource": "GENTOO", "tags": [], "url": "http://security.gentoo.org/glsa/glsa-201101-08.xml" }, { "name": "ADV-2011-0191", "refsource": "VUPEN", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0191" }, { "name": "43025", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/43025" }, { "name": "TLSA-2011-2", "refsource": "TURBO", "tags": [], "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-2j.txt" }, { "name": "ADV-2011-0344", "refsource": "VUPEN", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0344" }, { "name": "adobe-reader-cooltype-code-execution(61635)", "refsource": "XF", "tags": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61635" }, { "name": "oval:org.mitre.oval:def:11586", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11586" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": true } }, "lastModifiedDate": "2018-10-30T16:25Z", "publishedDate": "2010-09-09T22:00Z" } } }
rhsa-2010_0743
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated acroread packages that fix multiple security issues are now\navailable for Red Hat Enterprise Linux 4 Extras and Red Hat Enterprise\nLinux 5 Supplementary.\n\nThe Red Hat Security Response Team has rated this update as having critical\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "Adobe Reader allows users to view and print documents in Portable Document\nFormat (PDF).\n\nThis update fixes multiple vulnerabilities in Adobe Reader. These\nvulnerabilities are detailed on the Adobe security page APSB10-21, listed\nin the References section.\n\nA specially-crafted PDF file could cause Adobe Reader to crash or,\npotentially, execute arbitrary code as the user running Adobe Reader when\nopened. (CVE-2010-2883, CVE-2010-2884, CVE-2010-2889, CVE-2010-2890,\nCVE-2010-3619, CVE-2010-3620, CVE-2010-3621, CVE-2010-3622, CVE-2010-3625,\nCVE-2010-3626, CVE-2010-3627, CVE-2010-3628, CVE-2010-3629, CVE-2010-3630,\nCVE-2010-3632, CVE-2010-3658)\n\nAn insecure relative RPATH (runtime library search path) set in some Adobe\nReader libraries could allow a local attacker, who is able to convince\nanother user to run Adobe Reader in an attacker-controlled directory, to\nexecute arbitrary code with the privileges of the victim. (CVE-2010-2887)\n\nA specially-crafted PDF file could cause Adobe Reader to crash when opened.\n(CVE-2010-3656, CVE-2010-3657)\n\nAll Adobe Reader users should install these updated packages. They contain\nAdobe Reader version 9.4, which is not vulnerable to these issues. All\nrunning instances of Adobe Reader must be restarted for the update to take\neffect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2010:0743", "url": "https://access.redhat.com/errata/RHSA-2010:0743" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "http://www.adobe.com/support/security/bulletins/apsb10-21.html", "url": "http://www.adobe.com/support/security/bulletins/apsb10-21.html" }, { "category": "external", "summary": "632267", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=632267" }, { "category": "external", "summary": "633917", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=633917" }, { "category": "external", "summary": "639890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=639890" }, { "category": "external", "summary": "639903", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=639903" }, { "category": "external", "summary": "639913", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=639913" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0743.json" } ], "title": "Red Hat Security Advisory: acroread security update", "tracking": { "current_release_date": "2024-11-14T11:27:40+00:00", "generator": { "date": "2024-11-14T11:27:40+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2010:0743", "initial_release_date": "2010-10-06T10:25:00+00:00", "revision_history": [ { "date": "2010-10-06T10:25:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2010-10-06T06:28:46+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T11:27:40+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4 Extras", "product": { "name": "Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Desktop version 4 Extras", "product": { "name": "Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4 Extras", "product": { "name": "Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4 Extras", "product": { "name": "Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product": { "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Supplementary (v. 5)", "product": { "name": "Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux Supplementary" }, { "branches": [ { "category": "product_version", "name": "acroread-0:9.4.0-1.el4.i386", "product": { "name": "acroread-0:9.4.0-1.el4.i386", "product_id": "acroread-0:9.4.0-1.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/acroread@9.4.0-1.el4?arch=i386" } } }, { "category": "product_version", "name": "acroread-plugin-0:9.4.0-1.el4.i386", "product": { "name": "acroread-plugin-0:9.4.0-1.el4.i386", "product_id": "acroread-plugin-0:9.4.0-1.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/acroread-plugin@9.4.0-1.el4?arch=i386" } } }, { "category": "product_version", "name": "acroread-0:9.4.0-1.el5.i386", "product": { "name": "acroread-0:9.4.0-1.el5.i386", "product_id": "acroread-0:9.4.0-1.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/acroread@9.4.0-1.el5?arch=i386" } } }, { "category": "product_version", "name": "acroread-plugin-0:9.4.0-1.el5.i386", "product": { "name": "acroread-plugin-0:9.4.0-1.el5.i386", "product_id": "acroread-plugin-0:9.4.0-1.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/acroread-plugin@9.4.0-1.el5?arch=i386" } } } ], "category": "architecture", "name": "i386" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "acroread-0:9.4.0-1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:acroread-0:9.4.0-1.el4.i386" }, "product_reference": "acroread-0:9.4.0-1.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-plugin-0:9.4.0-1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:acroread-plugin-0:9.4.0-1.el4.i386" }, "product_reference": "acroread-plugin-0:9.4.0-1.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-0:9.4.0-1.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:acroread-0:9.4.0-1.el4.i386" }, "product_reference": "acroread-0:9.4.0-1.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-plugin-0:9.4.0-1.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:acroread-plugin-0:9.4.0-1.el4.i386" }, "product_reference": "acroread-plugin-0:9.4.0-1.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-0:9.4.0-1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:acroread-0:9.4.0-1.el4.i386" }, "product_reference": "acroread-0:9.4.0-1.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-plugin-0:9.4.0-1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:acroread-plugin-0:9.4.0-1.el4.i386" }, "product_reference": "acroread-plugin-0:9.4.0-1.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-0:9.4.0-1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:acroread-0:9.4.0-1.el4.i386" }, "product_reference": "acroread-0:9.4.0-1.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-plugin-0:9.4.0-1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:acroread-plugin-0:9.4.0-1.el4.i386" }, "product_reference": "acroread-plugin-0:9.4.0-1.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-0:9.4.0-1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:acroread-0:9.4.0-1.el5.i386" }, "product_reference": "acroread-0:9.4.0-1.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-plugin-0:9.4.0-1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386" }, "product_reference": "acroread-plugin-0:9.4.0-1.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-0:9.4.0-1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:acroread-0:9.4.0-1.el5.i386" }, "product_reference": "acroread-0:9.4.0-1.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-plugin-0:9.4.0-1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386" }, "product_reference": "acroread-plugin-0:9.4.0-1.el5.i386", "relates_to_product_reference": "5Server-Supplementary" } ] }, "vulnerabilities": [ { "cve": "CVE-2010-2883", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "discovery_date": "2010-09-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "632267" } ], "notes": [ { "category": "description", "text": "Stack-based buffer overflow in CoolType.dll in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a PDF document with a long field in a Smart INdependent Glyphlets (SING) table in a TTF font, as exploited in the wild in September 2010. NOTE: some of these details are obtained from third party information.", "title": "Vulnerability description" }, { "category": "summary", "text": "Acroread: Stack-based buffer overflow by processing certain fonts (APSA10-02)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:acroread-0:9.4.0-1.el4.i386", "4AS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "5Client-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-2883" }, { "category": "external", "summary": "RHBZ#632267", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=632267" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-2883", "url": "https://www.cve.org/CVERecord?id=CVE-2010-2883" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-2883", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2883" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2010-09-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-10-06T10:25:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:acroread-0:9.4.0-1.el4.i386", "4AS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "5Client-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0743" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:acroread-0:9.4.0-1.el4.i386", "4AS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "5Client-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-06-08T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Critical" } ], "title": "Acroread: Stack-based buffer overflow by processing certain fonts (APSA10-02)" }, { "cve": "CVE-2010-2884", "discovery_date": "2010-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "633917" } ], "notes": [ { "category": "description", "text": "Adobe Flash Player 10.1.82.76 and earlier on Windows, Mac OS X, Linux, and Solaris and 10.1.92.10 on Android; authplay.dll in Adobe Reader and Acrobat 9.x before 9.4; and authplay.dll in Adobe Reader and Acrobat 8.x before 8.2.5 on Windows and Mac OS X allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, as exploited in the wild in September 2010.", "title": "Vulnerability description" }, { "category": "summary", "text": "Flash: crash or potential arbitrary code execution (APSB10-22)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:acroread-0:9.4.0-1.el4.i386", "4AS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "5Client-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-2884" }, { "category": "external", "summary": "RHBZ#633917", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=633917" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-2884", "url": "https://www.cve.org/CVERecord?id=CVE-2010-2884" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-2884", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2884" } ], "release_date": "2010-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-10-06T10:25:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:acroread-0:9.4.0-1.el4.i386", "4AS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "5Client-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0743" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:acroread-0:9.4.0-1.el4.i386", "4AS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "5Client-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Flash: crash or potential arbitrary code execution (APSB10-22)" }, { "cve": "CVE-2010-2887", "discovery_date": "2010-01-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "639913" } ], "notes": [ { "category": "description", "text": "Multiple unspecified vulnerabilities in Adobe Reader and Acrobat 9.x before 9.4 on Linux allow attackers to gain privileges via unknown vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "acroread: use of insecure RPATH (APSB10-21)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:acroread-0:9.4.0-1.el4.i386", "4AS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "5Client-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-2887" }, { "category": "external", "summary": "RHBZ#639913", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=639913" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-2887", "url": "https://www.cve.org/CVERecord?id=CVE-2010-2887" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-2887", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2887" } ], "release_date": "2010-10-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-10-06T10:25:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:acroread-0:9.4.0-1.el4.i386", "4AS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "5Client-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0743" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:acroread-0:9.4.0-1.el4.i386", "4AS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "5Client-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "acroread: use of insecure RPATH (APSB10-21)" }, { "cve": "CVE-2010-2889", "discovery_date": "2010-10-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "639890" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows attackers to execute arbitrary code via a crafted font, a different vulnerability than CVE-2010-3626.", "title": "Vulnerability description" }, { "category": "summary", "text": "acroread: multiple code execution flaws (APSB10-21)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:acroread-0:9.4.0-1.el4.i386", "4AS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "5Client-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-2889" }, { "category": "external", "summary": "RHBZ#639890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=639890" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-2889", "url": "https://www.cve.org/CVERecord?id=CVE-2010-2889" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-2889", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2889" } ], "release_date": "2010-10-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-10-06T10:25:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:acroread-0:9.4.0-1.el4.i386", "4AS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "5Client-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0743" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:acroread-0:9.4.0-1.el4.i386", "4AS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "5Client-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "acroread: multiple code execution flaws (APSB10-21)" }, { "cve": "CVE-2010-2890", "discovery_date": "2010-10-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "639890" } ], "notes": [ { "category": "description", "text": "Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-3619, CVE-2010-3621, CVE-2010-3622, CVE-2010-3628, CVE-2010-3632, and CVE-2010-3658.", "title": "Vulnerability description" }, { "category": "summary", "text": "acroread: multiple code execution flaws (APSB10-21)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:acroread-0:9.4.0-1.el4.i386", "4AS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "5Client-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-2890" }, { "category": "external", "summary": "RHBZ#639890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=639890" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-2890", "url": "https://www.cve.org/CVERecord?id=CVE-2010-2890" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-2890", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2890" } ], "release_date": "2010-10-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-10-06T10:25:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:acroread-0:9.4.0-1.el4.i386", "4AS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "5Client-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0743" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:acroread-0:9.4.0-1.el4.i386", "4AS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "5Client-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "acroread: multiple code execution flaws (APSB10-21)" }, { "cve": "CVE-2010-3619", "discovery_date": "2010-10-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "639890" } ], "notes": [ { "category": "description", "text": "Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2890, CVE-2010-3621, CVE-2010-3622, CVE-2010-3628, CVE-2010-3632, and CVE-2010-3658.", "title": "Vulnerability description" }, { "category": "summary", "text": "acroread: multiple code execution flaws (APSB10-21)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:acroread-0:9.4.0-1.el4.i386", "4AS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "5Client-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3619" }, { "category": "external", "summary": "RHBZ#639890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=639890" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3619", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3619" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3619", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3619" } ], "release_date": "2010-10-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-10-06T10:25:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:acroread-0:9.4.0-1.el4.i386", "4AS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "5Client-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0743" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:acroread-0:9.4.0-1.el4.i386", "4AS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "5Client-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "acroread: multiple code execution flaws (APSB10-21)" }, { "cve": "CVE-2010-3620", "discovery_date": "2010-10-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "639890" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows attackers to execute arbitrary code via a crafted image, a different vulnerability than CVE-2010-3629.", "title": "Vulnerability description" }, { "category": "summary", "text": "acroread: multiple code execution flaws (APSB10-21)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:acroread-0:9.4.0-1.el4.i386", "4AS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "5Client-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3620" }, { "category": "external", "summary": "RHBZ#639890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=639890" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3620", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3620" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3620", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3620" } ], "release_date": "2010-10-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-10-06T10:25:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:acroread-0:9.4.0-1.el4.i386", "4AS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "5Client-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0743" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:acroread-0:9.4.0-1.el4.i386", "4AS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "5Client-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "acroread: multiple code execution flaws (APSB10-21)" }, { "cve": "CVE-2010-3621", "discovery_date": "2010-10-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "639890" } ], "notes": [ { "category": "description", "text": "Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2890, CVE-2010-3619, CVE-2010-3622, CVE-2010-3628, CVE-2010-3632, and CVE-2010-3658.", "title": "Vulnerability description" }, { "category": "summary", "text": "acroread: multiple code execution flaws (APSB10-21)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:acroread-0:9.4.0-1.el4.i386", "4AS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "5Client-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3621" }, { "category": "external", "summary": "RHBZ#639890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=639890" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3621", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3621" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3621", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3621" } ], "release_date": "2010-10-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-10-06T10:25:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:acroread-0:9.4.0-1.el4.i386", "4AS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "5Client-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0743" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:acroread-0:9.4.0-1.el4.i386", "4AS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "5Client-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "acroread: multiple code execution flaws (APSB10-21)" }, { "cve": "CVE-2010-3622", "discovery_date": "2010-10-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "639890" } ], "notes": [ { "category": "description", "text": "Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2890, CVE-2010-3619, CVE-2010-3621, CVE-2010-3628, CVE-2010-3632, and CVE-2010-3658.", "title": "Vulnerability description" }, { "category": "summary", "text": "acroread: multiple code execution flaws (APSB10-21)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:acroread-0:9.4.0-1.el4.i386", "4AS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "5Client-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3622" }, { "category": "external", "summary": "RHBZ#639890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=639890" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3622", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3622" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3622", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3622" } ], "release_date": "2010-10-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-10-06T10:25:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:acroread-0:9.4.0-1.el4.i386", "4AS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "5Client-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0743" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:acroread-0:9.4.0-1.el4.i386", "4AS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "5Client-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "acroread: multiple code execution flaws (APSB10-21)" }, { "cve": "CVE-2010-3625", "discovery_date": "2010-10-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "639890" } ], "notes": [ { "category": "description", "text": "Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allow attackers to execute arbitrary code via unspecified vectors, related to a \"prefix protocol handler vulnerability.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "acroread: multiple code execution flaws (APSB10-21)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:acroread-0:9.4.0-1.el4.i386", "4AS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "5Client-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3625" }, { "category": "external", "summary": "RHBZ#639890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=639890" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3625", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3625" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3625", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3625" } ], "release_date": "2010-10-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-10-06T10:25:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:acroread-0:9.4.0-1.el4.i386", "4AS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "5Client-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0743" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:acroread-0:9.4.0-1.el4.i386", "4AS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "5Client-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "acroread: multiple code execution flaws (APSB10-21)" }, { "cve": "CVE-2010-3626", "discovery_date": "2010-10-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "639890" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows attackers to execute arbitrary code via a crafted font, a different vulnerability than CVE-2010-2889.", "title": "Vulnerability description" }, { "category": "summary", "text": "acroread: multiple code execution flaws (APSB10-21)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:acroread-0:9.4.0-1.el4.i386", "4AS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "5Client-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3626" }, { "category": "external", "summary": "RHBZ#639890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=639890" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3626", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3626" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3626", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3626" } ], "release_date": "2010-10-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-10-06T10:25:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:acroread-0:9.4.0-1.el4.i386", "4AS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "5Client-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0743" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:acroread-0:9.4.0-1.el4.i386", "4AS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "5Client-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "acroread: multiple code execution flaws (APSB10-21)" }, { "cve": "CVE-2010-3627", "discovery_date": "2010-10-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "639890" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows attackers to execute arbitrary code via unknown vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "acroread: multiple code execution flaws (APSB10-21)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:acroread-0:9.4.0-1.el4.i386", "4AS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "5Client-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3627" }, { "category": "external", "summary": "RHBZ#639890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=639890" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3627", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3627" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3627", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3627" } ], "release_date": "2010-10-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-10-06T10:25:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:acroread-0:9.4.0-1.el4.i386", "4AS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "5Client-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0743" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:acroread-0:9.4.0-1.el4.i386", "4AS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "5Client-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "acroread: multiple code execution flaws (APSB10-21)" }, { "cve": "CVE-2010-3628", "discovery_date": "2010-10-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "639890" } ], "notes": [ { "category": "description", "text": "Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2890, CVE-2010-3619, CVE-2010-3621, CVE-2010-3622, CVE-2010-3632, and CVE-2010-3658.", "title": "Vulnerability description" }, { "category": "summary", "text": "acroread: multiple code execution flaws (APSB10-21)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:acroread-0:9.4.0-1.el4.i386", "4AS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "5Client-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3628" }, { "category": "external", "summary": "RHBZ#639890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=639890" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3628", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3628" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3628", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3628" } ], "release_date": "2010-10-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-10-06T10:25:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:acroread-0:9.4.0-1.el4.i386", "4AS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "5Client-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0743" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:acroread-0:9.4.0-1.el4.i386", "4AS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "5Client-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "acroread: multiple code execution flaws (APSB10-21)" }, { "cve": "CVE-2010-3629", "discovery_date": "2010-10-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "639890" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows attackers to execute arbitrary code via a crafted image, a different vulnerability than CVE-2010-3620.", "title": "Vulnerability description" }, { "category": "summary", "text": "acroread: multiple code execution flaws (APSB10-21)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:acroread-0:9.4.0-1.el4.i386", "4AS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "5Client-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3629" }, { "category": "external", "summary": "RHBZ#639890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=639890" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3629", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3629" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3629", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3629" } ], "release_date": "2010-10-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-10-06T10:25:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:acroread-0:9.4.0-1.el4.i386", "4AS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "5Client-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0743" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:acroread-0:9.4.0-1.el4.i386", "4AS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "5Client-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "acroread: multiple code execution flaws (APSB10-21)" }, { "cve": "CVE-2010-3630", "discovery_date": "2010-10-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "639890" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows attackers to cause a denial of service or possibly execute arbitrary code via unknown vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "acroread: multiple code execution flaws (APSB10-21)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:acroread-0:9.4.0-1.el4.i386", "4AS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "5Client-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3630" }, { "category": "external", "summary": "RHBZ#639890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=639890" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3630", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3630" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3630", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3630" } ], "release_date": "2010-10-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-10-06T10:25:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:acroread-0:9.4.0-1.el4.i386", "4AS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "5Client-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0743" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:acroread-0:9.4.0-1.el4.i386", "4AS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "5Client-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "acroread: multiple code execution flaws (APSB10-21)" }, { "cve": "CVE-2010-3632", "discovery_date": "2010-10-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "639890" } ], "notes": [ { "category": "description", "text": "Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2890, CVE-2010-3619, CVE-2010-3621, CVE-2010-3622, CVE-2010-3628, and CVE-2010-3658.", "title": "Vulnerability description" }, { "category": "summary", "text": "acroread: multiple code execution flaws (APSB10-21)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:acroread-0:9.4.0-1.el4.i386", "4AS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "5Client-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3632" }, { "category": "external", "summary": "RHBZ#639890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=639890" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3632", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3632" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3632", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3632" } ], "release_date": "2010-10-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-10-06T10:25:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:acroread-0:9.4.0-1.el4.i386", "4AS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "5Client-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0743" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:acroread-0:9.4.0-1.el4.i386", "4AS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "5Client-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "acroread: multiple code execution flaws (APSB10-21)" }, { "cve": "CVE-2010-3656", "discovery_date": "2010-10-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "639903" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows attackers to cause a denial of service via unknown vectors, a different vulnerability than CVE-2010-3657.", "title": "Vulnerability description" }, { "category": "summary", "text": "acroread: denial of service flaws (APSB10-21)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:acroread-0:9.4.0-1.el4.i386", "4AS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "5Client-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3656" }, { "category": "external", "summary": "RHBZ#639903", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=639903" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3656", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3656" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3656", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3656" } ], "release_date": "2010-10-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-10-06T10:25:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:acroread-0:9.4.0-1.el4.i386", "4AS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "5Client-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0743" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 0.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:N", "version": "2.0" }, "products": [ "4AS-LACD:acroread-0:9.4.0-1.el4.i386", "4AS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "5Client-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "acroread: denial of service flaws (APSB10-21)" }, { "cve": "CVE-2010-3657", "discovery_date": "2010-10-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "639903" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows attackers to cause a denial of service via unknown vectors, a different vulnerability than CVE-2010-3656.", "title": "Vulnerability description" }, { "category": "summary", "text": "acroread: denial of service flaws (APSB10-21)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:acroread-0:9.4.0-1.el4.i386", "4AS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "5Client-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3657" }, { "category": "external", "summary": "RHBZ#639903", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=639903" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3657", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3657" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3657", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3657" } ], "release_date": "2010-10-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-10-06T10:25:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:acroread-0:9.4.0-1.el4.i386", "4AS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "5Client-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0743" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 0.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:N", "version": "2.0" }, "products": [ "4AS-LACD:acroread-0:9.4.0-1.el4.i386", "4AS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "5Client-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "acroread: denial of service flaws (APSB10-21)" }, { "cve": "CVE-2010-3658", "discovery_date": "2010-10-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "639890" } ], "notes": [ { "category": "description", "text": "Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2890, CVE-2010-3619, CVE-2010-3621, CVE-2010-3622, CVE-2010-3628, and CVE-2010-3632.", "title": "Vulnerability description" }, { "category": "summary", "text": "acroread: multiple code execution flaws (APSB10-21)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:acroread-0:9.4.0-1.el4.i386", "4AS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "5Client-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3658" }, { "category": "external", "summary": "RHBZ#639890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=639890" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3658", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3658" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3658", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3658" } ], "release_date": "2010-10-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-10-06T10:25:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:acroread-0:9.4.0-1.el4.i386", "4AS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "5Client-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0743" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:acroread-0:9.4.0-1.el4.i386", "4AS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-0:9.4.0-1.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-0:9.4.0-1.el4.i386", "4ES-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-0:9.4.0-1.el4.i386", "4WS-LACD:acroread-plugin-0:9.4.0-1.el4.i386", "5Client-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-0:9.4.0-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.4.0-1.el5.i386" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "acroread: multiple code execution flaws (APSB10-21)" } ] }
ghsa-m6wc-h767-27c3
Vulnerability from github
Stack-based buffer overflow in CoolType.dll in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a PDF document with a long field in a Smart INdependent Glyphlets (SING) table in a TTF font, as exploited in the wild in September 2010. NOTE: some of these details are obtained from third party information.
{ "affected": [], "aliases": [ "CVE-2010-2883" ], "database_specific": { "cwe_ids": [ "CWE-119", "CWE-787" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2010-09-09T22:00:00Z", "severity": "HIGH" }, "details": "Stack-based buffer overflow in CoolType.dll in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a PDF document with a long field in a Smart INdependent Glyphlets (SING) table in a TTF font, as exploited in the wild in September 2010. NOTE: some of these details are obtained from third party information.", "id": "GHSA-m6wc-h767-27c3", "modified": "2024-12-19T18:31:34Z", "published": "2022-05-14T02:18:00Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2883" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61635" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11586" }, { "type": "WEB", "url": "http://blog.metasploit.com/2010/09/return-of-unpublished-adobe.html" }, { "type": "WEB", "url": "http://community.websense.com/blogs/securitylabs/archive/2010/09/10/brief-analysis-on-adobe-reader-sing-table-parsing-vulnerability-cve-2010-2883.aspx" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00001.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/41340" }, { "type": "WEB", "url": "http://secunia.com/advisories/43025" }, { "type": "WEB", "url": "http://security.gentoo.org/glsa/glsa-201101-08.xml" }, { "type": "WEB", "url": "http://www.adobe.com/support/security/advisories/apsa10-02.html" }, { "type": "WEB", "url": "http://www.adobe.com/support/security/bulletins/apsb10-21.html" }, { "type": "WEB", "url": "http://www.kb.cert.org/vuls/id/491991" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2010-0743.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/43057" }, { "type": "WEB", "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-2j.txt" }, { "type": "WEB", "url": "http://www.us-cert.gov/cas/techalerts/TA10-279A.html" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2010/2331" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2011/0191" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2011/0344" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
var-201009-0242
Vulnerability from variot
Stack-based buffer overflow in CoolType.dll in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a PDF document with a long field in a Smart INdependent Glyphlets (SING) table in a TTF font, as exploited in the wild in September 2010. NOTE: some of these details are obtained from third party information. Adobe Reader and Acrobat contains a buffer overflow vulnerability. Adobe Reader and Acrobat for, CoolType.dll There is a buffer overflow vulnerability due to the font analysis code of this application. Attacks exploiting this vulnerability have been confirmed.Crafted PDF When a user views the document, arbitrary code may be executed or a denial of service may occur. (DoS) You may be attacked. An attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition. ----------------------------------------------------------------------
Secure your corporate defenses and reduce complexity in handling vulnerability threats with the new Secunia Vulnerability Intelligence Manager (VIM). This fixes multiple vulnerabilities, which can be exploited by malicious, local users to gain escalated privileges and by malicious people to compromise a user's system. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
National Cyber Alert System
Technical Cyber Security Alert TA10-279A
Adobe Reader and Acrobat Affected by Multiple Vulnerabilities
Original release date: October 06, 2010 Last revised: -- Source: US-CERT
Systems Affected
* Adobe Reader 9.3.4 and earlier versions for Windows, Macintosh, and UNIX
* Adobe Acrobat 9.3.4 and earlier versions for Windows and Macintosh
* Adobe Reader 8.2.4 and earlier versions for Windows, Macintosh, and UNIX
* Adobe Acrobat 8.2.4 and earlier versions for Windows and Macintosh
Overview
Adobe has released Security Bulletin APSB10-21, which describes multiple vulnerabilities affecting Adobe Reader and Acrobat.
I.
An attacker could exploit these vulnerabilities by convincing a user to open a specially crafted PDF file. The Adobe Reader browser plug-in, which can automatically open PDF documents hosted on a website, is available for multiple web browsers and operating systems.
II.
III. Solution
Update
Adobe has released updates to address this issue. Acrobat JavaScript can be disabled using the Preferences menu (Edit -> Preferences -> JavaScript; uncheck Enable Acrobat JavaScript).
Adobe provides a framework to blacklist specific JavaScipt APIs. If JavaScript must be enabled, this feature may be useful when specific APIs are known to be vulnerable or used in attacks.
Prevent Internet Explorer from automatically opening PDF files
The installer for Adobe Reader and Acrobat configures Internet Explorer to automatically open PDF files without any user interaction. This behavior can be reverted to a safer option that prompts the user by importing the following as a .REG file:
Windows Registry Editor Version 5.00
[HKEY_CLASSES_ROOT\AcroExch.Document.7] "EditFlags"=hex:00,00,00,00
Disable the display of PDF files in the web browser
Preventing PDF files from opening inside a web browser will partially mitigate this vulnerability. If this workaround is applied, it may also mitigate future vulnerabilities.
To prevent PDF files from automatically being opened in a web browser, do the following:
- Open the Edit menu.
- Choose the Preferences option.
- Choose the Internet section.
- Uncheck the "Display PDF in browser" checkbox.
Do not access PDF files from untrusted sources
Do not open unfamiliar or unexpected PDF files, particularly those hosted on websites or delivered as email attachments. Please see Cyber Security Tip ST04-010.
IV. Please send email to cert@cert.org with "TA10-279A Feedback VU#491991" in the subject.
For instructions on subscribing to or unsubscribing from this mailing list, visit http://www.us-cert.gov/cas/signup.html.
Produced 2010 by US-CERT, a government organization.
Terms of use:
<http://www.us-cert.gov/legal.html>
Revision History
October 06, 2010: Initial release
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.5 (GNU/Linux)
iQEVAwUBTKxxvD6pPKYJORa3AQIL3wgAp2tynQw73VA+B70fuEl+os17BeVaP8zn 5aoWS6QBRx+Q8Ijw1wnKT1sF4IWaDWTWqPo0yt6MLx8WwO2ei8WaB+aMOwy9ZBo3 BbCOPSM63/3jBrJuCDs4x2PhZDzg2GJf4Zw8NN2oCSOXMxYGhx16QQzo2lY35CBJ cvCSiLtNQuqpnvNMi2DJhArwxStK9Un2fli7IqwXzC6+RIgrk1l/EAM/6CO2+AwJ Se0bDWBjwR5YverLEXoLuBbF0lHvQ0+V/vT5Q/zBDYUwcWkBL2n7NwdbKI9pYZxL 8Te7YapqAnMNgI1/PnYI/W369Vq3U6QoQVVR9ZoyLGw8x0A57cpU2g== =Rc0h -----END PGP SIGNATURE----- . ----------------------------------------------------------------------
Windows Applications Insecure Library Loading
The Official, Verified Secunia List: http://secunia.com/advisories/windows_insecure_library_loading/
The list is continuously updated as we confirm the vulnerability reports so check back regularly too see if any of your apps are affected.
TITLE: Adobe Reader / Acrobat Font Parsing Buffer Overflow Vulnerability
SECUNIA ADVISORY ID: SA41340
VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/41340/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=41340
RELEASE DATE: 2010-09-08
DISCUSS ADVISORY: http://secunia.com/advisories/41340/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)
http://secunia.com/advisories/41340/
ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=41340
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION: A vulnerability has been discovered in Adobe Reader, which can be exploited by malicious people to compromise a user's system.
The vulnerability is confirmed in versions 8.2.4 and 9.3.4.
SOLUTION: Do not open untrusted files.
PROVIDED AND/OR DISCOVERED BY: Reported as a 0-day.
ORIGINAL ADVISORY: http://contagiodump.blogspot.com/2010/09/cve-david-leadbetters-one-point-lesson.html
OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
DEEP LINKS: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
EXPLOIT: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201101-08
http://security.gentoo.org/
Severity: Normal Title: Adobe Reader: Multiple vulnerabilities Date: January 21, 2011 Bugs: #336508, #343091 ID: 201101-08
Synopsis
Multiple vulnerabilities in Adobe Reader might result in the execution of arbitrary code. For further information please consult the CVE entries and the Adobe Security Bulletins referenced below.
Workaround
There is no known workaround at this time.
Resolution
All Adobe Reader users should upgrade to the latest stable version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=app-text/acroread-9.4.1"
References
[ 1 ] APSB10-21 http://www.adobe.com/support/security/bulletins/apsb10-21.html [ 2 ] APSB10-28 http://www.adobe.com/support/security/bulletins/apsb10-28.html [ 3 ] CVE-2010-2883 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2883 [ 4 ] CVE-2010-2884 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2884 [ 5 ] CVE-2010-2887 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2887 [ 6 ] CVE-2010-2889 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2889 [ 7 ] CVE-2010-2890 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2890 [ 8 ] CVE-2010-3619 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3619 [ 9 ] CVE-2010-3620 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3620 [ 10 ] CVE-2010-3621 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3621 [ 11 ] CVE-2010-3622 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3622 [ 12 ] CVE-2010-3625 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3625 [ 13 ] CVE-2010-3626 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3626 [ 14 ] CVE-2010-3627 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3627 [ 15 ] CVE-2010-3628 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3628 [ 16 ] CVE-2010-3629 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3629 [ 17 ] CVE-2010-3630 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3630 [ 18 ] CVE-2010-3632 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3632 [ 19 ] CVE-2010-3654 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3654 [ 20 ] CVE-2010-3656 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3656 [ 21 ] CVE-2010-3657 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3657 [ 22 ] CVE-2010-3658 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3658 [ 23 ] CVE-2010-4091 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4091
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201101-08.xml
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2011 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201009-0242", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "acrobat reader", "scope": "lt", "trust": 1.0, "vendor": "adobe", "version": "8.2.5" }, { "model": "acrobat reader", "scope": "lt", "trust": 1.0, "vendor": "adobe", "version": "9.4" }, { "model": "acrobat", "scope": "gte", "trust": 1.0, "vendor": "adobe", "version": "8.0" }, { "model": "acrobat reader", "scope": "gte", "trust": 1.0, "vendor": "adobe", "version": "9.0" }, { "model": "acrobat", "scope": "lt", "trust": 1.0, "vendor": "adobe", "version": "9.4" }, { "model": "acrobat reader", "scope": "gte", "trust": 1.0, "vendor": "adobe", "version": "8.0" }, { "model": "acrobat", "scope": "gte", "trust": 1.0, "vendor": "adobe", "version": "9.0" }, { "model": "acrobat", "scope": "lt", "trust": 1.0, "vendor": "adobe", "version": "8.2.5" }, { "model": "acrobat", "scope": "eq", "trust": 0.9, "vendor": "adobe", "version": "9.3.1" }, { "model": "acrobat", "scope": "eq", "trust": 0.9, "vendor": "adobe", "version": "9.3.3" }, { "model": "acrobat", "scope": "eq", "trust": 0.9, "vendor": "adobe", "version": "9.3.2" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "adobe", "version": null }, { "model": "turbolinux client", "scope": null, "trust": 0.8, "vendor": "\u30bf\u30fc\u30dc\u30ea\u30ca\u30c3\u30af\u30b9", "version": null }, { "model": "rhel supplementary", "scope": "eq", "trust": 0.8, "vendor": "\u30ec\u30c3\u30c9\u30cf\u30c3\u30c8", "version": "5 (server)" }, { "model": "rhel desktop supplementary", "scope": null, "trust": 0.8, "vendor": "\u30ec\u30c3\u30c9\u30cf\u30c3\u30c8", "version": null }, { "model": "red hat enterprise linux extras", "scope": null, "trust": 0.8, "vendor": "\u30ec\u30c3\u30c9\u30cf\u30c3\u30c8", "version": null }, { "model": "adobe reader", "scope": null, "trust": 0.8, "vendor": "\u30a2\u30c9\u30d3", "version": null }, { "model": "adobe acrobat", "scope": null, "trust": 0.8, "vendor": "\u30a2\u30c9\u30d3", "version": null }, { "model": "acrobat", "scope": "eq", "trust": 0.6, "vendor": "adobe", "version": "8.1.4" }, { "model": "acrobat reader", "scope": "eq", "trust": 0.6, "vendor": "adobe", "version": "9.3.1" }, { "model": "acrobat", "scope": "eq", "trust": 0.6, "vendor": "adobe", "version": "8.1.6" }, { "model": "acrobat", "scope": "eq", "trust": 0.6, "vendor": "adobe", "version": "8.1.1" }, { "model": "acrobat reader", "scope": "eq", "trust": 0.6, "vendor": "adobe", "version": "9.3.3" }, { "model": "acrobat", "scope": "eq", "trust": 0.6, "vendor": "adobe", "version": "9.3.4" }, { "model": "acrobat", "scope": "eq", "trust": 0.6, "vendor": "adobe", "version": "8.2" }, { "model": "acrobat", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.1" }, { "model": "acrobat professional", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.1.3" }, { "model": "acrobat standard", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.1" }, { "model": "acrobat professional", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.3" }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.6" }, { "model": "opensuse", "scope": "ne", "trust": 0.3, "vendor": "suse", "version": "11.3" }, { "model": "acrobat standard", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.0" }, { "model": "acrobat professional", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.1.4" }, { "model": "acrobat standard", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.1.2" }, { "model": "acrobat professional", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.2.2" }, { "model": "linux enterprise sp3", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.2" }, { "model": "acrobat", "scope": "ne", "trust": 0.3, "vendor": "adobe", "version": "8.2.5" }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.3.3" }, { "model": "acrobat professional", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.3.1" }, { "model": "acrobat professional", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.3" }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.1.3" }, { "model": "acrobat professional", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.1.3" }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.3.4" }, { "model": "acrobat", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.2.3" }, { "model": "acrobat professional", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.1.6" }, { "model": "acrobat standard", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.3.3" }, { "model": "acrobat professional", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.1.1" }, { "model": "acrobat standard", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.8" }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0" }, { "model": "acrobat professional", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.4" }, { "model": "acrobat professional", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.1.4" }, { "model": "acrobat", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.2.4" }, { "model": "acrobat standard", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.2.4" }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "11.1" }, { "model": "acrobat standard", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.2" }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.1" }, { "model": "acrobat professional", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.1" }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.0" }, { "model": "acrobat professional", "scope": "ne", "trust": 0.3, "vendor": "adobe", "version": "9.4" }, { "model": "desktop extras", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "acrobat", "scope": "ne", "trust": 0.3, "vendor": "adobe", "version": "9.4" }, { "model": "acrobat standard", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.3.2" }, { "model": "acrobat standard", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.1.2" }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.1.2" }, { "model": "opensuse", "scope": "ne", "trust": 0.3, "vendor": "s u s e", "version": "11.1" }, { "model": "acrobat standard", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.2" }, { "model": "acrobat professional", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.1" }, { "model": "acrobat", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.3" }, { "model": "acrobat standard", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.1.3" }, { "model": "acrobat standard", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.3" }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.1.5" }, { "model": "acrobat professional", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.7" }, { "model": "acrobat professional", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.6" }, { "model": "acrobat professional", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9" }, { "model": "acrobat standard", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.1.4" }, { "model": "acrobat", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.2.2" }, { "model": "acrobat professional", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.2.1" }, { "model": "acrobat standard", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.2.2" }, { "model": "acrobat professional", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.1.7" }, { "model": "hat enterprise linux supplementary server", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "5" }, { "model": "enterprise linux extras", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "linux enterprise desktop", "scope": "ne", "trust": 0.3, "vendor": "suse", "version": "11" }, { "model": "acrobat standard", "scope": "ne", "trust": 0.3, "vendor": "adobe", "version": "8.2.5" }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.2.3" }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.8" }, { "model": "acrobat", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.3" }, { "model": "linux enterprise desktop sp3", "scope": "ne", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.2.4" }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.2" }, { "model": "acrobat", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.1.8" }, { "model": "acrobat professional", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.3.4" }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.3.2" }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.1.2" }, { "model": "acrobat standard", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.4" }, { "model": "acrobat professional", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.5" }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.2" }, { "model": "acrobat standard", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.1.4" }, { "model": "acrobat professional", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.1" }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.1.3" }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.3" }, { "model": "acrobat standard", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.1" }, { "model": "acrobat professional", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.1.1" }, { "model": "moblin", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "2.1" }, { "model": "acrobat", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.1.1" }, { "model": "acrobat standard", "scope": "ne", "trust": 0.3, "vendor": "adobe", "version": "9.4" }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.1.4" }, { "model": "acrobat professional security updat", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.1.2" }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.2.2" }, { "model": "acrobat professional", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.9" }, { "model": "linux enterprise sp1", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11" }, { "model": "acrobat standard", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.1" }, { "model": "enterprise linux es extras", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "reader", "scope": "ne", "trust": 0.3, "vendor": "adobe", "version": "8.2.5" }, { "model": "linux enterprise", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11" }, { "model": "acrobat standard", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.7" }, { "model": "acrobat standard", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9" }, { "model": "acrobat", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.1.2" }, { "model": "reader security updat", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.1.2" }, { "model": "acrobat standard", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.2.1" }, { "model": "acrobat standard", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.1.7" }, { "model": "linux", "scope": null, "trust": 0.3, "vendor": "gentoo", "version": null }, { "model": "acrobat professional", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.2" }, { "model": "acrobat standard", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.3.1" }, { "model": "acrobat professional", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.3.3" }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.4" }, { "model": "acrobat standard", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.3" }, { "model": "acrobat professional", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.8" }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.1.4" }, { "model": "acrobat professional", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.1.3" }, { "model": "acrobat standard", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.1.3" }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.1" }, { "model": "opensuse", "scope": "ne", "trust": 0.3, "vendor": "s u s e", "version": "11.2" }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.1.1" }, { "model": "acrobat standard", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.1.6" }, { "model": "reader", "scope": "ne", "trust": 0.3, "vendor": "adobe", "version": "9.4" }, { "model": "acrobat standard", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.1.1" }, { "model": "acrobat professional", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.3.2" }, { "model": "acrobat", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0" }, { "model": "acrobat standard", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.5" }, { "model": "acrobat professional", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0" }, { "model": "acrobat standard", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.1" }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.1" }, { "model": "acrobat standard", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.1.1" }, { "model": "acrobat professional", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.1" }, { "model": "moblin", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "2.0" }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.7" }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9" }, { "model": "acrobat professional", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.0" }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.1.2" }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.2.1" }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.1.7" }, { "model": "acrobat professional", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.1.2" }, { "model": "acrobat", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.9" }, { "model": "linux enterprise desktop sp1", "scope": "ne", "trust": 0.3, "vendor": "suse", "version": "11" }, { "model": "acrobat professional", "scope": "ne", "trust": 0.3, "vendor": "adobe", "version": "8.2.5" }, { "model": "acrobat standard", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.6" }, { "model": "hat enterprise linux desktop supplementary client", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "5" }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.3.1" }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.3" }, { "model": "acrobat", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.2" }, { "model": "acrobat standard", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.2" }, { "model": "enterprise linux ws extras", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.1.3" }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.1.6" }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "11.2" }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.1.1" }, { "model": "enterprise linux as extras", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.5" }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.1" }, { "model": "acrobat standard", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.1.3" }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.1.1" }, { "model": "acrobat professional", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.2.4" }, { "model": "acrobat professional", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.2" }, { "model": "acrobat standard", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.3.4" }, { "model": "acrobat professional", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.1.2" }, { "model": "acrobat standard", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0" }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11.3" }, { "model": "acrobat", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.2" }, { "model": "acrobat professional", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.2" }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.9" } ], "sources": [ { "db": "CERT/CC", "id": "VU#491991" }, { "db": "BID", "id": "43057" }, { "db": "JVNDB", "id": "JVNDB-2010-002088" }, { "db": "CNNVD", "id": "CNNVD-201009-077" }, { "db": "NVD", "id": "CVE-2010-2883" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Mila Parkour", "sources": [ { "db": "BID", "id": "43057" } ], "trust": 0.3 }, "cve": "CVE-2010-2883", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "CVE-2010-2883", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "VHN-45488", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.3, "id": "CVE-2010-2883", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.3, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2010-2883", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2010-2883", "trust": 1.0, "value": "HIGH" }, { "author": "CARNEGIE MELLON", "id": "VU#491991", "trust": 0.8, "value": "61.51" }, { "author": "NVD", "id": "CVE-2010-2883", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-201009-077", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-45488", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2010-2883", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#491991" }, { "db": "VULHUB", "id": "VHN-45488" }, { "db": "VULMON", "id": "CVE-2010-2883" }, { "db": "JVNDB", "id": "JVNDB-2010-002088" }, { "db": "CNNVD", "id": "CNNVD-201009-077" }, { "db": "NVD", "id": "CVE-2010-2883" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Stack-based buffer overflow in CoolType.dll in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a PDF document with a long field in a Smart INdependent Glyphlets (SING) table in a TTF font, as exploited in the wild in September 2010. NOTE: some of these details are obtained from third party information. Adobe Reader and Acrobat contains a buffer overflow vulnerability. Adobe Reader and Acrobat for, CoolType.dll There is a buffer overflow vulnerability due to the font analysis code of this application. Attacks exploiting this vulnerability have been confirmed.Crafted PDF When a user views the document, arbitrary code may be executed or a denial of service may occur. (DoS) You may be attacked. \nAn attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition. ----------------------------------------------------------------------\n\n\nSecure your corporate defenses and reduce complexity in handling vulnerability threats with the new Secunia Vulnerability Intelligence Manager (VIM). This fixes multiple\nvulnerabilities, which can be exploited by malicious, local users to\ngain escalated privileges and by malicious people to compromise a\nuser\u0027s system. \n-----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n\n National Cyber Alert System\n\n Technical Cyber Security Alert TA10-279A\n\n\nAdobe Reader and Acrobat Affected by Multiple Vulnerabilities\n\n Original release date: October 06, 2010\n Last revised: --\n Source: US-CERT\n\n\nSystems Affected\n\n * Adobe Reader 9.3.4 and earlier versions for Windows, Macintosh, and UNIX\n * Adobe Acrobat 9.3.4 and earlier versions for Windows and Macintosh\n * Adobe Reader 8.2.4 and earlier versions for Windows, Macintosh, and UNIX\n * Adobe Acrobat 8.2.4 and earlier versions for Windows and Macintosh\n\n\nOverview\n\n Adobe has released Security Bulletin APSB10-21, which describes\n multiple vulnerabilities affecting Adobe Reader and Acrobat. \n\n\nI. \n\n An attacker could exploit these vulnerabilities by convincing a\n user to open a specially crafted PDF file. The Adobe Reader browser\n plug-in, which can automatically open PDF documents hosted on a\n website, is available for multiple web browsers and operating\n systems. \n\n\nII. \n\n\nIII. Solution\n\n Update\n\n Adobe has released updates to address this issue. Acrobat JavaScript can be disabled using the\n Preferences menu (Edit -\u003e Preferences -\u003e JavaScript; uncheck Enable\n Acrobat JavaScript). \n\n Adobe provides a framework to blacklist specific JavaScipt APIs. If\n JavaScript must be enabled, this feature may be useful when\n specific APIs are known to be vulnerable or used in attacks. \n\n Prevent Internet Explorer from automatically opening PDF files\n\n The installer for Adobe Reader and Acrobat configures Internet\n Explorer to automatically open PDF files without any user\n interaction. This behavior can be reverted to a safer option that\n prompts the user by importing the following as a .REG file:\n\n Windows Registry Editor Version 5.00\n\n [HKEY_CLASSES_ROOT\\AcroExch.Document.7]\n \"EditFlags\"=hex:00,00,00,00\n\n Disable the display of PDF files in the web browser\n\n Preventing PDF files from opening inside a web browser will\n partially mitigate this vulnerability. If this workaround is\n applied, it may also mitigate future vulnerabilities. \n\n To prevent PDF files from automatically being opened in a web\n browser, do the following:\n\n 1. \n 2. Open the Edit menu. \n 3. Choose the Preferences option. \n 4. Choose the Internet section. \n 5. Uncheck the \"Display PDF in browser\" checkbox. \n\n Do not access PDF files from untrusted sources\n\n Do not open unfamiliar or unexpected PDF files, particularly those\n hosted on websites or delivered as email attachments. Please see\n Cyber Security Tip ST04-010. \n\n\nIV. Please send\n email to \u003ccert@cert.org\u003e with \"TA10-279A Feedback VU#491991\" in\n the subject. \n ____________________________________________________________________\n\n For instructions on subscribing to or unsubscribing from this\n mailing list, visit \u003chttp://www.us-cert.gov/cas/signup.html\u003e. \n ____________________________________________________________________\n\n Produced 2010 by US-CERT, a government organization. \n\n Terms of use:\n\n \u003chttp://www.us-cert.gov/legal.html\u003e\n ____________________________________________________________________\n\nRevision History\n\n October 06, 2010: Initial release\n\n\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.5 (GNU/Linux)\n\niQEVAwUBTKxxvD6pPKYJORa3AQIL3wgAp2tynQw73VA+B70fuEl+os17BeVaP8zn\n5aoWS6QBRx+Q8Ijw1wnKT1sF4IWaDWTWqPo0yt6MLx8WwO2ei8WaB+aMOwy9ZBo3\nBbCOPSM63/3jBrJuCDs4x2PhZDzg2GJf4Zw8NN2oCSOXMxYGhx16QQzo2lY35CBJ\ncvCSiLtNQuqpnvNMi2DJhArwxStK9Un2fli7IqwXzC6+RIgrk1l/EAM/6CO2+AwJ\nSe0bDWBjwR5YverLEXoLuBbF0lHvQ0+V/vT5Q/zBDYUwcWkBL2n7NwdbKI9pYZxL\n8Te7YapqAnMNgI1/PnYI/W369Vq3U6QoQVVR9ZoyLGw8x0A57cpU2g==\n=Rc0h\n-----END PGP SIGNATURE-----\n. ----------------------------------------------------------------------\n\n\nWindows Applications Insecure Library Loading\n\nThe Official, Verified Secunia List:\nhttp://secunia.com/advisories/windows_insecure_library_loading/\n\nThe list is continuously updated as we confirm the vulnerability reports so check back regularly too see if any of your apps are affected. \n\n\n----------------------------------------------------------------------\n\nTITLE:\nAdobe Reader / Acrobat Font Parsing Buffer Overflow Vulnerability\n\nSECUNIA ADVISORY ID:\nSA41340\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/41340/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=41340\n\nRELEASE DATE:\n2010-09-08\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/41340/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/41340/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=41340\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nA vulnerability has been discovered in Adobe Reader, which can be\nexploited by malicious people to compromise a user\u0027s system. \n\nThe vulnerability is confirmed in versions 8.2.4 and 9.3.4. \n\nSOLUTION:\nDo not open untrusted files. \n\nPROVIDED AND/OR DISCOVERED BY:\nReported as a 0-day. \n\nORIGINAL ADVISORY:\nhttp://contagiodump.blogspot.com/2010/09/cve-david-leadbetters-one-point-lesson.html\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 201101-08\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n http://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n Title: Adobe Reader: Multiple vulnerabilities\n Date: January 21, 2011\n Bugs: #336508, #343091\n ID: 201101-08\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities in Adobe Reader might result in the execution\nof arbitrary code. For further\ninformation please consult the CVE entries and the Adobe Security\nBulletins referenced below. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll Adobe Reader users should upgrade to the latest stable version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=app-text/acroread-9.4.1\"\n\nReferences\n==========\n\n [ 1 ] APSB10-21\n http://www.adobe.com/support/security/bulletins/apsb10-21.html\n [ 2 ] APSB10-28\n http://www.adobe.com/support/security/bulletins/apsb10-28.html\n [ 3 ] CVE-2010-2883\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2883\n [ 4 ] CVE-2010-2884\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2884\n [ 5 ] CVE-2010-2887\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2887\n [ 6 ] CVE-2010-2889\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2889\n [ 7 ] CVE-2010-2890\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2890\n [ 8 ] CVE-2010-3619\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3619\n [ 9 ] CVE-2010-3620\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3620\n [ 10 ] CVE-2010-3621\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3621\n [ 11 ] CVE-2010-3622\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3622\n [ 12 ] CVE-2010-3625\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3625\n [ 13 ] CVE-2010-3626\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3626\n [ 14 ] CVE-2010-3627\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3627\n [ 15 ] CVE-2010-3628\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3628\n [ 16 ] CVE-2010-3629\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3629\n [ 17 ] CVE-2010-3630\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3630\n [ 18 ] CVE-2010-3632\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3632\n [ 19 ] CVE-2010-3654\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3654\n [ 20 ] CVE-2010-3656\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3656\n [ 21 ] CVE-2010-3657\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3657\n [ 22 ] CVE-2010-3658\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3658\n [ 23 ] CVE-2010-4091\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4091\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-201101-08.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2011 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2010-2883" }, { "db": "CERT/CC", "id": "VU#491991" }, { "db": "JVNDB", "id": "JVNDB-2010-002088" }, { "db": "BID", "id": "43057" }, { "db": "VULHUB", "id": "VHN-45488" }, { "db": "VULMON", "id": "CVE-2010-2883" }, { "db": "PACKETSTORM", "id": "97778" }, { "db": "PACKETSTORM", "id": "94535" }, { "db": "PACKETSTORM", "id": "93611" }, { "db": "PACKETSTORM", "id": "97734" } ], "trust": 3.15 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://vulmon.com/exploitdetails?qidtp=exploitdb\u0026qid=16619", "trust": 0.2, "type": "exploit" }, { "reference": "https://www.scap.org.cn/vuln/vhn-45488", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-45488" }, { "db": "VULMON", "id": "CVE-2010-2883" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2010-2883", "trust": 4.6 }, { "db": "SECUNIA", "id": "41340", "trust": 3.5 }, { "db": "CERT/CC", "id": "VU#491991", "trust": 2.9 }, { "db": "BID", "id": "43057", "trust": 2.3 }, { "db": "USCERT", "id": "TA10-279A", "trust": 2.1 }, { "db": "VUPEN", "id": "ADV-2010-2331", "trust": 2.0 }, { "db": "SECUNIA", "id": "43025", "trust": 1.3 }, { "db": "VUPEN", "id": "ADV-2011-0344", "trust": 1.2 }, { "db": "VUPEN", "id": "ADV-2011-0191", "trust": 1.2 }, { "db": "VUPEN", "id": "ADV-2010-2573", "trust": 0.8 }, { "db": "XF", "id": "61635", "trust": 0.8 }, { "db": "USCERT", "id": "SA10-279A", "trust": 0.8 }, { "db": "USCERT", "id": "TA15-119A", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2010-002088", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201009-077", "trust": 0.7 }, { "db": "PACKETSTORM", "id": "97734", "trust": 0.2 }, { "db": "EXPLOIT-DB", "id": "16619", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "93627", "trust": 0.1 }, { "db": "EXPLOIT-DB", "id": "16494", "trust": 0.1 }, { "db": "SEEBUG", "id": "SSVID-71008", "trust": 0.1 }, { "db": "SEEBUG", "id": "SSVID-88893", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-45488", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2010-2883", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "97778", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "94535", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "93611", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#491991" }, { "db": "VULHUB", "id": "VHN-45488" }, { "db": "VULMON", "id": "CVE-2010-2883" }, { "db": "BID", "id": "43057" }, { "db": "JVNDB", "id": "JVNDB-2010-002088" }, { "db": "PACKETSTORM", "id": "97778" }, { "db": "PACKETSTORM", "id": "94535" }, { "db": "PACKETSTORM", "id": "93611" }, { "db": "PACKETSTORM", "id": "97734" }, { "db": "CNNVD", "id": "CNNVD-201009-077" }, { "db": "NVD", "id": "CVE-2010-2883" } ] }, "id": "VAR-201009-0242", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-45488" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T20:20:52.251000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "TA10-279A", "trust": 0.8, "url": "http://www.adobe.com/support/security/advisories/apsa10-02.html" }, { "title": "Red Hat: Critical: acroread security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20100743 - Security Advisory" }, { "title": "myblog", "trust": 0.1, "url": "https://github.com/Zhouyi827/myblog " }, { "title": "rop-collection", "trust": 0.1, "url": "https://github.com/season-lab/rop-collection " }, { "title": "articles", "trust": 0.1, "url": "https://github.com/xinali/articles " }, { "title": "Securelist", "trust": 0.1, "url": "https://securelist.com/the-spring-dragon-apt/70726/" }, { "title": "Securelist", "trust": 0.1, "url": "https://securelist.com/monthly-malware-statistics-october-2010/36327/" }, { "title": "Threatpost", "trust": 0.1, "url": "https://threatpost.com/adobe-issues-huge-patch-reader-and-acrobat-100610/74551/" }, { "title": "Threatpost", "trust": 0.1, "url": "https://threatpost.com/adobe-release-critical-reader-patch-early-100110/74540/" }, { "title": "Threatpost", "trust": 0.1, "url": "https://threatpost.com/adobe-exploit-bypasses-aslr-and-dep-drops-signed-malicious-file-090910/74445/" }, { "title": "Threatpost", "trust": 0.1, "url": "https://threatpost.com/new-adobe-pdf-zero-day-flaw-under-attack-090810/74442/" } ], "sources": [ { "db": "VULMON", "id": "CVE-2010-2883" }, { "db": "JVNDB", "id": "JVNDB-2010-002088" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.0 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-119", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-45488" }, { "db": "JVNDB", "id": "JVNDB-2010-002088" }, { "db": "NVD", "id": "CVE-2010-2883" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.4, "url": "http://secunia.com/advisories/41340" }, { "trust": 2.9, "url": "http://blog.metasploit.com/2010/09/return-of-unpublished-adobe.html" }, { "trust": 2.7, "url": "http://www.adobe.com/support/security/bulletins/apsb10-21.html" }, { "trust": 2.1, "url": "http://www.kb.cert.org/vuls/id/491991" }, { "trust": 2.0, "url": "http://community.websense.com/blogs/securitylabs/archive/2010/09/10/brief-analysis-on-adobe-reader-sing-table-parsing-vulnerability-cve-2010-2883.aspx" }, { "trust": 2.0, "url": "http://www.securityfocus.com/bid/43057" }, { "trust": 2.0, "url": "http://www.us-cert.gov/cas/techalerts/ta10-279a.html" }, { "trust": 2.0, "url": "http://www.vupen.com/english/advisories/2010/2331" }, { "trust": 1.8, "url": "http://www.adobe.com/support/security/advisories/apsa10-02.html" }, { "trust": 1.3, "url": "http://security.gentoo.org/glsa/glsa-201101-08.xml" }, { "trust": 1.2, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a11586" }, { "trust": 1.2, "url": "http://www.redhat.com/support/errata/rhsa-2010-0743.html" }, { "trust": 1.2, "url": "http://secunia.com/advisories/43025" }, { "trust": 1.2, "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00001.html" }, { "trust": 1.2, "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" }, { "trust": 1.2, "url": "http://www.turbolinux.co.jp/security/2011/tlsa-2011-2j.txt" }, { "trust": 1.2, "url": "http://www.vupen.com/english/advisories/2011/0191" }, { "trust": 1.2, "url": "http://www.vupen.com/english/advisories/2011/0344" }, { "trust": 1.2, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61635" }, { "trust": 1.1, "url": "http://blogs.technet.com/b/srd/archive/2010/09/10/use-emet-2-0-to-block-the-adobe-0-day-exploit.aspx" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu491991" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnta10-279a" }, { "trust": 0.8, "url": "http://jvn.jp/ta/jvnta99041988/" }, { "trust": 0.8, "url": "http://jvn.jp/tr/jvntr-2010-24" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-2883" }, { "trust": 0.8, "url": "http://www.jpcert.or.jp/at/2010/at100026.txt" }, { "trust": 0.8, "url": "http://www.npa.go.jp/cyberpolice/#topics" }, { "trust": 0.8, "url": "http://www.us-cert.gov/cas/alerts/sa10-279a.html" }, { "trust": 0.8, "url": "https://www.us-cert.gov/ncas/alerts/ta15-119a" }, { "trust": 0.8, "url": "https://cisa.gov/known-exploited-vulnerabilities-catalog" }, { "trust": 0.8, "url": "http://www.ipa.go.jp/security/ciadr/vul/20101006-adobe.html" }, { "trust": 0.8, "url": "http://xforce.iss.net/xforce/xfdb/61635" }, { "trust": 0.8, "url": "http://www.vupen.com/english/advisories/2010/2573" }, { "trust": 0.4, "url": "http://contagiodump.blogspot.com/2010/09/cve-david-leadbetters-one-point-lesson.html" }, { "trust": 0.3, "url": "https://www.rafzar.com/node/22" }, { "trust": 0.3, "url": "http://www.adobe.com" }, { "trust": 0.2, "url": "http://secunia.com/products/corporate/evm/" }, { "trust": 0.2, "url": "http://secunia.com/advisories/secunia_security_advisories/" }, { "trust": 0.2, "url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/" }, { "trust": 0.2, "url": "http://secunia.com/vulnerability_scanning/personal/" }, { "trust": 0.2, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.2, "url": "http://secunia.com/advisories/about_secunia_advisories/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/119.html" }, { "trust": 0.1, "url": "https://github.com/zhouyi827/myblog" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://www.exploit-db.com/exploits/16619/" }, { "trust": 0.1, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=21550" }, { "trust": 0.1, "url": "http://secunia.com/advisories/43025/" }, { "trust": 0.1, "url": "http://secunia.com/products/corporate/vim/" }, { "trust": 0.1, "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=43025" }, { "trust": 0.1, "url": "http://secunia.com/advisories/43025/#comments" }, { "trust": 0.1, "url": "http://www.gentoo.org/security/en/glsa/glsa-201101-08.xml" }, { "trust": 0.1, "url": "http://www.kb.cert.org/vuls/id/491991\u003e" }, { "trust": 0.1, "url": "http://www.us-cert.gov/cas/techalerts/ta10-279a.html\u003e" }, { "trust": 0.1, "url": "http://kb2.adobe.com/cps/504/cpsid_50431.html\u003e" }, { "trust": 0.1, "url": "http://www.adobe.com/support/security/bulletins/apsb10-21.html\u003e" }, { "trust": 0.1, "url": "http://www.us-cert.gov/cas/signup.html\u003e." }, { "trust": 0.1, "url": "http://www.us-cert.gov/legal.html\u003e" }, { "trust": 0.1, "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=41340" }, { "trust": 0.1, "url": "http://secunia.com/advisories/windows_insecure_library_loading/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/41340/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/41340/#comments" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2890" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3620" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3656" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3621" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3619" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2889" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2883" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2890" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3629" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3629" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3619" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3625" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-4091" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3628" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2883" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3625" }, { "trust": 0.1, "url": "http://www.adobe.com/support/security/bulletins/apsb10-28.html" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3626" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3657" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3654" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3657" }, { "trust": 0.1, "url": "http://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3622" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3658" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3627" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2884" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3620" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3632" }, { "trust": 0.1, "url": "http://security.gentoo.org/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3654" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3632" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2889" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3622" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3656" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2887" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3621" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3628" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3626" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3627" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2884" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3658" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2887" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-4091" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3630" }, { "trust": 0.1, "url": "https://bugs.gentoo.org." }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3630" } ], "sources": [ { "db": "CERT/CC", "id": "VU#491991" }, { "db": "VULHUB", "id": "VHN-45488" }, { "db": "VULMON", "id": "CVE-2010-2883" }, { "db": "BID", "id": "43057" }, { "db": "JVNDB", "id": "JVNDB-2010-002088" }, { "db": "PACKETSTORM", "id": "97778" }, { "db": "PACKETSTORM", "id": "94535" }, { "db": "PACKETSTORM", "id": "93611" }, { "db": "PACKETSTORM", "id": "97734" }, { "db": "CNNVD", "id": "CNNVD-201009-077" }, { "db": "NVD", "id": "CVE-2010-2883" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#491991" }, { "db": "VULHUB", "id": "VHN-45488" }, { "db": "VULMON", "id": "CVE-2010-2883" }, { "db": "BID", "id": "43057" }, { "db": "JVNDB", "id": "JVNDB-2010-002088" }, { "db": "PACKETSTORM", "id": "97778" }, { "db": "PACKETSTORM", "id": "94535" }, { "db": "PACKETSTORM", "id": "93611" }, { "db": "PACKETSTORM", "id": "97734" }, { "db": "CNNVD", "id": "CNNVD-201009-077" }, { "db": "NVD", "id": "CVE-2010-2883" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2010-09-14T00:00:00", "db": "CERT/CC", "id": "VU#491991" }, { "date": "2010-09-09T00:00:00", "db": "VULHUB", "id": "VHN-45488" }, { "date": "2010-09-09T00:00:00", "db": "VULMON", "id": "CVE-2010-2883" }, { "date": "2010-09-08T00:00:00", "db": "BID", "id": "43057" }, { "date": "2010-10-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2010-002088" }, { "date": "2011-01-24T07:05:02", "db": "PACKETSTORM", "id": "97778" }, { "date": "2010-10-06T21:20:41", "db": "PACKETSTORM", "id": "94535" }, { "date": "2010-09-08T06:01:23", "db": "PACKETSTORM", "id": "93611" }, { "date": "2011-01-21T21:14:13", "db": "PACKETSTORM", "id": "97734" }, { "date": "2010-09-13T00:00:00", "db": "CNNVD", "id": "CNNVD-201009-077" }, { "date": "2010-09-09T22:00:02.250000", "db": "NVD", "id": "CVE-2010-2883" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2010-10-29T00:00:00", "db": "CERT/CC", "id": "VU#491991" }, { "date": "2018-10-30T00:00:00", "db": "VULHUB", "id": "VHN-45488" }, { "date": "2018-10-30T00:00:00", "db": "VULMON", "id": "CVE-2010-2883" }, { "date": "2013-06-20T09:40:00", "db": "BID", "id": "43057" }, { "date": "2024-07-05T06:01:00", "db": "JVNDB", "id": "JVNDB-2010-002088" }, { "date": "2011-07-11T00:00:00", "db": "CNNVD", "id": "CNNVD-201009-077" }, { "date": "2024-11-21T01:17:33.657000", "db": "NVD", "id": "CVE-2010-2883" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201009-077" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Adobe Reader and Acrobat Font Parsing Buffer Overflow Vulnerability", "sources": [ { "db": "CERT/CC", "id": "VU#491991" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer overflow", "sources": [ { "db": "CNNVD", "id": "CNNVD-201009-077" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.