fkie_cve-2010-2181
Vulnerability from fkie_nvd
Published
2010-06-15 18:00
Modified
2024-11-21 01:16
Severity ?
Summary
Integer overflow in Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, might allow attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-2170 and CVE-2010-2183.
References
psirt@adobe.comhttp://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
psirt@adobe.comhttp://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
psirt@adobe.comhttp://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
psirt@adobe.comhttp://lists.opensuse.org/opensuse-security-announce/2010-06/msg00000.html
psirt@adobe.comhttp://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html
psirt@adobe.comhttp://secunia.com/advisories/40144
psirt@adobe.comhttp://secunia.com/advisories/40545
psirt@adobe.comhttp://secunia.com/advisories/43026
psirt@adobe.comhttp://security.gentoo.org/glsa/glsa-201101-09.xml
psirt@adobe.comhttp://securitytracker.com/id?1024085
psirt@adobe.comhttp://securitytracker.com/id?1024086
psirt@adobe.comhttp://support.apple.com/kb/HT4435
psirt@adobe.comhttp://www.adobe.com/support/security/bulletins/apsb10-14.htmlPatch, Vendor Advisory
psirt@adobe.comhttp://www.redhat.com/support/errata/RHSA-2010-0464.html
psirt@adobe.comhttp://www.redhat.com/support/errata/RHSA-2010-0470.html
psirt@adobe.comhttp://www.securityfocus.com/bid/40759
psirt@adobe.comhttp://www.securityfocus.com/bid/40792
psirt@adobe.comhttp://www.turbolinux.co.jp/security/2010/TLSA-2010-19j.txt
psirt@adobe.comhttp://www.us-cert.gov/cas/techalerts/TA10-162A.htmlUS Government Resource
psirt@adobe.comhttp://www.vupen.com/english/advisories/2010/1421
psirt@adobe.comhttp://www.vupen.com/english/advisories/2010/1432
psirt@adobe.comhttp://www.vupen.com/english/advisories/2010/1434
psirt@adobe.comhttp://www.vupen.com/english/advisories/2010/1453
psirt@adobe.comhttp://www.vupen.com/english/advisories/2010/1482
psirt@adobe.comhttp://www.vupen.com/english/advisories/2010/1522
psirt@adobe.comhttp://www.vupen.com/english/advisories/2010/1793
psirt@adobe.comhttp://www.vupen.com/english/advisories/2011/0192
psirt@adobe.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/59330
psirt@adobe.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15937
psirt@adobe.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7342
af854a3a-2127-422b-91ae-364da2661108http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
af854a3a-2127-422b-91ae-364da2661108http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00000.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/40144
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/40545
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/43026
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-201101-09.xml
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1024085
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1024086
af854a3a-2127-422b-91ae-364da2661108http://support.apple.com/kb/HT4435
af854a3a-2127-422b-91ae-364da2661108http://www.adobe.com/support/security/bulletins/apsb10-14.htmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2010-0464.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2010-0470.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/40759
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/40792
af854a3a-2127-422b-91ae-364da2661108http://www.turbolinux.co.jp/security/2010/TLSA-2010-19j.txt
af854a3a-2127-422b-91ae-364da2661108http://www.us-cert.gov/cas/techalerts/TA10-162A.htmlUS Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2010/1421
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2010/1432
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2010/1434
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2010/1453
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2010/1482
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2010/1522
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2010/1793
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0192
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/59330
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15937
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7342
Impacted products
Vendor Product Version
adobe flash_player 9.0.16
adobe flash_player 9.0.20
adobe flash_player 9.0.20.0
adobe flash_player 9.0.28
adobe flash_player 9.0.28.0
adobe flash_player 9.0.31
adobe flash_player 9.0.31.0
adobe flash_player 9.0.45.0
adobe flash_player 9.0.47.0
adobe flash_player 9.0.48.0
adobe flash_player 9.0.115.0
adobe flash_player 9.0.124.0
adobe flash_player 9.0.125.0
adobe flash_player 9.0.151.0
adobe flash_player 9.0.152.0
adobe flash_player 9.0.159.0
adobe flash_player 9.0.246.0
adobe flash_player 9.0.260.0
adobe flash_player 9.0.262.0
adobe flash_player *
adobe flash_player 10.0.0.584
adobe flash_player 10.0.12.10
adobe flash_player 10.0.12.36
adobe flash_player 10.0.15.3
adobe flash_player 10.0.22.87
adobe flash_player 10.0.32.18
adobe flash_player 10.0.42.34
adobe flash_player 6.0.79
adobe flash_player 7.0
adobe flash_player 7.0.1
adobe flash_player 7.0.14.0
adobe flash_player 7.0.19.0
adobe flash_player 7.0.24.0
adobe flash_player 7.0.25
adobe flash_player 7.0.53.0
adobe flash_player 7.0.60.0
adobe flash_player 7.0.61.0
adobe flash_player 7.0.63
adobe flash_player 7.0.66.0
adobe flash_player 7.0.67.0
adobe flash_player 7.0.68.0
adobe flash_player 7.0.69.0
adobe flash_player 7.0.70.0
adobe flash_player 7.0.73.0
adobe flash_player 7.1
adobe flash_player 7.1.1
adobe flash_player 7.2
adobe flash_player 8.0
adobe flash_player 8.0.22.0
adobe flash_player 8.0.24.0
adobe flash_player 8.0.33.0
adobe flash_player 8.0.34.0
adobe flash_player 8.0.35.0
adobe flash_player 8.0.39.0
adobe flash_player 8.0.42.0
macromedia flash_player 5.0
macromedia flash_player 5.0.30.0
macromedia flash_player 5.0.41.0
macromedia flash_player 5.0.42.0
macromedia flash_player 5.0.58.0
adobe air *
adobe air 1.0
adobe air 1.1
adobe air 1.5
adobe air 1.5.1
adobe air 1.5.2
adobe air 1.5.3



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*",
                     matchCriteriaId: "F35F86B6-D49A-40F4-BFFA-5D6BBA2F7D8B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4D5E27C-F6BF-4F84-9B83-6AEC98B4AA14",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "934A869D-D58D-4C36-B86E-013F62790585",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*",
                     matchCriteriaId: "ACFA6611-99DA-48B0-89F7-DD99B8E30334",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "59AF804B-BD7A-4AD7-AD44-B5D980443B8B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*",
                     matchCriteriaId: "F5D52F86-2E38-4C66-9939-7603367B8D0E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "0557AA2A-FA3A-460A-8F03-DC74B149CA3D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FC04ABF-6191-4AA5-90B2-E7A97E6C6005",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F22F1B02-CCF5-4770-A79B-1F58CA4321CE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "93957171-F1F4-43ED-A8B9-2D36C81EB1F9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "260E2CF6-4D15-4168-A933-3EC52D8F93FF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:adobe:flash_player:9.0.124.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D50BF190-2629-49A8-A377-4723C93FFB3E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:adobe:flash_player:9.0.125.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "9E59E2AD-38BB-46DF-AC0D-D36F1F259AD4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:adobe:flash_player:9.0.151.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD04F04C-30CE-4A8D-B254-B10DEF62CEEE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:adobe:flash_player:9.0.152.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "96DC7742-499D-4BF5-9C5B-FCFF912A9892",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:adobe:flash_player:9.0.159.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "33AC4365-576C-487A-89C5-197A26D416C4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:adobe:flash_player:9.0.246.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "84B367AC-E1E1-4BC5-8BF4-D5B517C0CA7C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:adobe:flash_player:9.0.260.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "A0A9C054-1F82-41DD-BE13-2B71B6F87F22",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:adobe:flash_player:9.0.262.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CB0781E-D5B5-4576-ABD4-0EE1C0C3DF12",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "44CD02DC-30FC-4429-84B7-7BE1D2007DAE",
                     versionEndIncluding: "10.0.45.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:adobe:flash_player:10.0.0.584:*:*:*:*:*:*:*",
                     matchCriteriaId: "08E4028B-72E7-4E4A-AD0F-645F5AACAA29",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:adobe:flash_player:10.0.12.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "63313ADA-3C52-47C8-9745-6BF6AEF0F6AD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:adobe:flash_player:10.0.12.36:*:*:*:*:*:*:*",
                     matchCriteriaId: "BA646396-7C10-45A0-89A9-C75C5D8AFB3E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:adobe:flash_player:10.0.15.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "476BB487-150A-4482-8C84-E6A2995A97E1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:adobe:flash_player:10.0.22.87:*:*:*:*:*:*:*",
                     matchCriteriaId: "3555324F-40F8-4BF4-BE5F-52A1E22B3AFA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:adobe:flash_player:10.0.32.18:*:*:*:*:*:*:*",
                     matchCriteriaId: "60540FDE-8C31-4679-A85E-614B1EFE1FF0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:adobe:flash_player:10.0.42.34:*:*:*:*:*:*:*",
                     matchCriteriaId: "AE652520-B693-47F1-A342-621C149A7430",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:adobe:flash_player:6.0.79:*:*:*:*:*:*:*",
                     matchCriteriaId: "4654752C-F677-4066-8C48-BAD09392A594",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:adobe:flash_player:7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDFF4A51-C936-4C5B-8276-FD454C9E4F40",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:adobe:flash_player:7.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "D5ECC9D7-3386-4FEA-9218-91E31FF90F3A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:adobe:flash_player:7.0.14.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "6E81EA32-9621-4ACE-9191-2E9B8C24D500",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:adobe:flash_player:7.0.19.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B0E10D6-6348-471B-918A-60AAE2AC5F86",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:adobe:flash_player:7.0.24.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F7FBE855-7EE3-46F2-9FA1-0366AC8C5D24",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:adobe:flash_player:7.0.25:*:*:*:*:*:*:*",
                     matchCriteriaId: "F0E93289-6EE0-401A-958D-F59D2CDAE2F1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:adobe:flash_player:7.0.53.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "A67FC00F-0C85-4DD7-81EA-65533EABC767",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:adobe:flash_player:7.0.60.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "14E67AD7-0791-4D5D-A3B2-E173088B5228",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:adobe:flash_player:7.0.61.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "EAF07696-9C85-470E-B608-1B0193CAFB6D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:adobe:flash_player:7.0.63:*:*:*:*:*:*:*",
                     matchCriteriaId: "0FA3E556-BF8F-4D30-8DE5-09DA3FD8D5C3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:adobe:flash_player:7.0.66.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "C0DC1B9D-686D-46A3-B9F4-DD4E078DF74D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:adobe:flash_player:7.0.67.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "4BC3ABBA-8B36-448D-883B-C675C202028A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:adobe:flash_player:7.0.68.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF2A52D9-0A1C-4E53-AFA2-148FF03D23A3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82D5B56-44E0-4120-B73E-0A1155AF4B05",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:adobe:flash_player:7.0.70.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "8E895107-ED8A-4F88-87C3-935EAE299C01",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:adobe:flash_player:7.0.73.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "1752F67C-75A9-4226-AB30-A94EB6C85526",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:adobe:flash_player:7.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "4007D621-A0BC-4927-82A7-10D73802BCF8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:adobe:flash_player:7.1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "641776AE-5408-439E-8290-DD9324771874",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:adobe:flash_player:7.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "138A932A-D775-46A2-86EC-3C03C96884C4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:adobe:flash_player:8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D12E3957-D7B2-4F3B-BB64-8B50B8958DEF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:adobe:flash_player:8.0.22.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "C0C5537E-3153-400D-9F9B-91E7F1218C8A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:adobe:flash_player:8.0.24.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "32912721-F750-4C20-B999-E728F7D3A85D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:adobe:flash_player:8.0.33.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "6693B1C4-B2A9-4725-AD0E-A266B9DF55AB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:adobe:flash_player:8.0.34.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "A95FA639-346C-491C-81A8-6C2A7B01AA19",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:adobe:flash_player:8.0.35.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9F1E5AB-DEFA-42FC-A299-C8EEB778F9C6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC7DD938-F963-4E03-B66B-F00436E4EA9D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:adobe:flash_player:8.0.42.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "351825F4-227D-4743-A74B-EAFC1034500B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:macromedia:flash_player:5.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF005FC1-50A0-4233-A500-1E677EACDBE7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:macromedia:flash_player:5.0.30.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "6541DE99-2A2B-4664-898E-E4EEF48ED75F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:macromedia:flash_player:5.0.41.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "4255DFE1-CF66-4CF2-9463-2E75B2C4A3DD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:macromedia:flash_player:5.0.42.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "856951A6-241E-449F-9AC8-5AE513A4702C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:macromedia:flash_player:5.0.58.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "C27A0F35-1910-40B5-BD91-C7E707483F28",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "3E3142EF-AD90-4F4D-AA3B-9D6DEB0A7167",
                     versionEndIncluding: "1.5.3.9130",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:adobe:air:1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "697E64F5-0150-4542-B3C3-7443A00E8DB4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:adobe:air:1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C2F45DC-32D8-4152-B090-C764B1998C0A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:adobe:air:1.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "15DDE65E-ED35-42B6-A139-BB6F571B5967",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:adobe:air:1.5.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "718BD4E9-2D25-445B-9660-468F85C02B6E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:adobe:air:1.5.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "3D1DCA6E-056D-4464-9D08-F390171C5C56",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:adobe:air:1.5.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "728F223D-16EB-4CC4-BE1C-CB9DA924A5CC",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Integer overflow in Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, might allow attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-2170 and CVE-2010-2183.",
      },
      {
         lang: "es",
         value: "Desbordamiento de entero en Adobe Flash Player anterior a v9.0.277.0 y v10.x anterior a v10.1.53.64, y Adobe AIR anterior a v2.0.2.12610, puede que permita a los atacantes ejecutar código de su elección a través de vectores no especificados. Se trata de una vulnerabilidad diferente de CVE-2010-2170 y CVE-2010-2183.",
      },
   ],
   evaluatorImpact: "Per: http://www.adobe.com/support/security/bulletins/apsb10-14.html\r\n\r\n'Affected software versions\r\n\r\nAdobe Flash Player 10.0.45.2 and earlier versions for Windows, Macintosh, Linux and Solaris\r\n\r\nAdobe AIR 1.5.3.9130 and earlier versions for Windows, Macintosh and Linux'",
   id: "CVE-2010-2181",
   lastModified: "2024-11-21T01:16:06.177",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 9.3,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:N/AC:M/Au:N/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 10,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
   },
   published: "2010-06-15T18:00:01.780",
   references: [
      {
         source: "psirt@adobe.com",
         url: "http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751",
      },
      {
         source: "psirt@adobe.com",
         url: "http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751",
      },
      {
         source: "psirt@adobe.com",
         url: "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html",
      },
      {
         source: "psirt@adobe.com",
         url: "http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00000.html",
      },
      {
         source: "psirt@adobe.com",
         url: "http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html",
      },
      {
         source: "psirt@adobe.com",
         url: "http://secunia.com/advisories/40144",
      },
      {
         source: "psirt@adobe.com",
         url: "http://secunia.com/advisories/40545",
      },
      {
         source: "psirt@adobe.com",
         url: "http://secunia.com/advisories/43026",
      },
      {
         source: "psirt@adobe.com",
         url: "http://security.gentoo.org/glsa/glsa-201101-09.xml",
      },
      {
         source: "psirt@adobe.com",
         url: "http://securitytracker.com/id?1024085",
      },
      {
         source: "psirt@adobe.com",
         url: "http://securitytracker.com/id?1024086",
      },
      {
         source: "psirt@adobe.com",
         url: "http://support.apple.com/kb/HT4435",
      },
      {
         source: "psirt@adobe.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.adobe.com/support/security/bulletins/apsb10-14.html",
      },
      {
         source: "psirt@adobe.com",
         url: "http://www.redhat.com/support/errata/RHSA-2010-0464.html",
      },
      {
         source: "psirt@adobe.com",
         url: "http://www.redhat.com/support/errata/RHSA-2010-0470.html",
      },
      {
         source: "psirt@adobe.com",
         url: "http://www.securityfocus.com/bid/40759",
      },
      {
         source: "psirt@adobe.com",
         url: "http://www.securityfocus.com/bid/40792",
      },
      {
         source: "psirt@adobe.com",
         url: "http://www.turbolinux.co.jp/security/2010/TLSA-2010-19j.txt",
      },
      {
         source: "psirt@adobe.com",
         tags: [
            "US Government Resource",
         ],
         url: "http://www.us-cert.gov/cas/techalerts/TA10-162A.html",
      },
      {
         source: "psirt@adobe.com",
         url: "http://www.vupen.com/english/advisories/2010/1421",
      },
      {
         source: "psirt@adobe.com",
         url: "http://www.vupen.com/english/advisories/2010/1432",
      },
      {
         source: "psirt@adobe.com",
         url: "http://www.vupen.com/english/advisories/2010/1434",
      },
      {
         source: "psirt@adobe.com",
         url: "http://www.vupen.com/english/advisories/2010/1453",
      },
      {
         source: "psirt@adobe.com",
         url: "http://www.vupen.com/english/advisories/2010/1482",
      },
      {
         source: "psirt@adobe.com",
         url: "http://www.vupen.com/english/advisories/2010/1522",
      },
      {
         source: "psirt@adobe.com",
         url: "http://www.vupen.com/english/advisories/2010/1793",
      },
      {
         source: "psirt@adobe.com",
         url: "http://www.vupen.com/english/advisories/2011/0192",
      },
      {
         source: "psirt@adobe.com",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/59330",
      },
      {
         source: "psirt@adobe.com",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15937",
      },
      {
         source: "psirt@adobe.com",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7342",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00000.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/40144",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/40545",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/43026",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://security.gentoo.org/glsa/glsa-201101-09.xml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://securitytracker.com/id?1024085",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://securitytracker.com/id?1024086",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://support.apple.com/kb/HT4435",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.adobe.com/support/security/bulletins/apsb10-14.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2010-0464.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2010-0470.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/40759",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/40792",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.turbolinux.co.jp/security/2010/TLSA-2010-19j.txt",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "US Government Resource",
         ],
         url: "http://www.us-cert.gov/cas/techalerts/TA10-162A.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vupen.com/english/advisories/2010/1421",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vupen.com/english/advisories/2010/1432",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vupen.com/english/advisories/2010/1434",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vupen.com/english/advisories/2010/1453",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vupen.com/english/advisories/2010/1482",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vupen.com/english/advisories/2010/1522",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vupen.com/english/advisories/2010/1793",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vupen.com/english/advisories/2011/0192",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/59330",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15937",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7342",
      },
   ],
   sourceIdentifier: "psirt@adobe.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-189",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.