All the vulnerabilites related to adobe - creative_suite
cve-2007-2682
Vulnerability from cvelistv5
Published
2007-05-18 18:00
Modified
2024-08-07 13:49
Severity ?
Summary
The installer for Adobe Version Cue CS3 Server on Apple Mac OS X, as used in Adobe Creative Suite 3 (CS3), does not re-enable the personal firewall after completing the product installation, which allows remote attackers to bypass intended firewall rules.
References
https://exchange.xforce.ibmcloud.com/vulnerabilities/34342vdb-entry, x_refsource_XF
http://www.adobe.com/support/security/bulletins/apsb07-11.htmlx_refsource_CONFIRM
http://osvdb.org/35868vdb-entry, x_refsource_OSVDB
http://www.securityfocus.com/bid/24027vdb-entry, x_refsource_BID
http://securitytracker.com/id?1018075vdb-entry, x_refsource_SECTRACK
http://secunia.com/advisories/25291third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2007/1850vdb-entry, x_refsource_VUPEN
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T13:49:57.277Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "adobe-installer-security-bypass(34342)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34342"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.adobe.com/support/security/bulletins/apsb07-11.html"
          },
          {
            "name": "35868",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/35868"
          },
          {
            "name": "24027",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/24027"
          },
          {
            "name": "1018075",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1018075"
          },
          {
            "name": "25291",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/25291"
          },
          {
            "name": "ADV-2007-1850",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/1850"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-05-16T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The installer for Adobe Version Cue CS3 Server on Apple Mac OS X, as used in Adobe Creative Suite 3 (CS3), does not re-enable the personal firewall after completing the product installation, which allows remote attackers to bypass intended firewall rules."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "adobe-installer-security-bypass(34342)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34342"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.adobe.com/support/security/bulletins/apsb07-11.html"
        },
        {
          "name": "35868",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/35868"
        },
        {
          "name": "24027",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/24027"
        },
        {
          "name": "1018075",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1018075"
        },
        {
          "name": "25291",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/25291"
        },
        {
          "name": "ADV-2007-1850",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/1850"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-2682",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The installer for Adobe Version Cue CS3 Server on Apple Mac OS X, as used in Adobe Creative Suite 3 (CS3), does not re-enable the personal firewall after completing the product installation, which allows remote attackers to bypass intended firewall rules."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "adobe-installer-security-bypass(34342)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34342"
            },
            {
              "name": "http://www.adobe.com/support/security/bulletins/apsb07-11.html",
              "refsource": "CONFIRM",
              "url": "http://www.adobe.com/support/security/bulletins/apsb07-11.html"
            },
            {
              "name": "35868",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/35868"
            },
            {
              "name": "24027",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/24027"
            },
            {
              "name": "1018075",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1018075"
            },
            {
              "name": "25291",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/25291"
            },
            {
              "name": "ADV-2007-1850",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/1850"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-2682",
    "datePublished": "2007-05-18T18:00:00",
    "dateReserved": "2007-05-15T00:00:00",
    "dateUpdated": "2024-08-07T13:49:57.277Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2005-0151
Vulnerability from cvelistv5
Published
2005-06-09 04:00
Modified
2024-08-07 21:05
Severity ?
Summary
Unknown vulnerability in the installation of Adobe License Management Service, as used in Adobe Photoshop CS, Adobe Creative Suite 1.0, and Adobe Premiere Pro 1.5, allows attackers to gain administrator privileges.
References
http://securitytracker.com/id?1014168vdb-entry, x_refsource_SECTRACK
http://www.adobe.com/support/techdocs/331688.htmlx_refsource_CONFIRM
http://securitytracker.com/id?1014170vdb-entry, x_refsource_SECTRACK
http://securitytracker.com/id?1014169vdb-entry, x_refsource_SECTRACK
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T21:05:24.997Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1014168",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1014168"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.adobe.com/support/techdocs/331688.html"
          },
          {
            "name": "1014170",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1014170"
          },
          {
            "name": "1014169",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1014169"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-06-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unknown vulnerability in the installation of Adobe License Management Service, as used in Adobe Photoshop CS, Adobe Creative Suite 1.0, and Adobe Premiere Pro 1.5, allows attackers to gain administrator privileges."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2006-01-12T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "1014168",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1014168"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.adobe.com/support/techdocs/331688.html"
        },
        {
          "name": "1014170",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1014170"
        },
        {
          "name": "1014169",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1014169"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-0151",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unknown vulnerability in the installation of Adobe License Management Service, as used in Adobe Photoshop CS, Adobe Creative Suite 1.0, and Adobe Premiere Pro 1.5, allows attackers to gain administrator privileges."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1014168",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1014168"
            },
            {
              "name": "http://www.adobe.com/support/techdocs/331688.html",
              "refsource": "CONFIRM",
              "url": "http://www.adobe.com/support/techdocs/331688.html"
            },
            {
              "name": "1014170",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1014170"
            },
            {
              "name": "1014169",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1014169"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-0151",
    "datePublished": "2005-06-09T04:00:00",
    "dateReserved": "2005-01-25T00:00:00",
    "dateUpdated": "2024-08-07T21:05:24.997Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2006-0525
Vulnerability from cvelistv5
Published
2006-02-02 11:00
Modified
2024-08-07 16:41
Severity ?
Summary
Multiple Adobe products, including (1) Photoshop CS2, (2) Illustrator CS2, and (3) Adobe Help Center, install a large number of .EXE and .DLL files with write-access permission for the Everyone group, which allows local users to gain privileges via Trojan horse programs.
References
http://www.adobe.com/support/techdocs/332644.htmlx_refsource_CONFIRM
http://www.securityfocus.com/bid/16451vdb-entry, x_refsource_BID
http://securitytracker.com/id?1015577vdb-entry, x_refsource_SECTRACK
http://securitytracker.com/id?1015579vdb-entry, x_refsource_SECTRACK
http://www.securityfocus.com/archive/1/423587/100/0/threadedmailing-list, x_refsource_BUGTRAQ
http://www.kb.cert.org/vuls/id/953860third-party-advisory, x_refsource_CERT-VN
http://secunia.com/advisories/18698third-party-advisory, x_refsource_SECUNIA
http://www.cs.princeton.edu/~sudhakar/papers/winval.pdfx_refsource_MISC
http://securitytracker.com/id?1015578vdb-entry, x_refsource_SECTRACK
https://exchange.xforce.ibmcloud.com/vulnerabilities/24464vdb-entry, x_refsource_XF
http://www.vupen.com/english/advisories/2006/0431vdb-entry, x_refsource_VUPEN
http://www.osvdb.org/22908vdb-entry, x_refsource_OSVDB
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T16:41:28.898Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.adobe.com/support/techdocs/332644.html"
          },
          {
            "name": "16451",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/16451"
          },
          {
            "name": "1015577",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1015577"
          },
          {
            "name": "1015579",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1015579"
          },
          {
            "name": "20060131 Windows Access Control Demystified",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/423587/100/0/threaded"
          },
          {
            "name": "VU#953860",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/953860"
          },
          {
            "name": "18698",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18698"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.cs.princeton.edu/~sudhakar/papers/winval.pdf"
          },
          {
            "name": "1015578",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1015578"
          },
          {
            "name": "adobe-insecure-default-permissions(24464)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24464"
          },
          {
            "name": "ADV-2006-0431",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/0431"
          },
          {
            "name": "22908",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/22908"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-01-31T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple Adobe products, including (1) Photoshop CS2, (2) Illustrator CS2, and (3) Adobe Help Center, install a large number of .EXE and .DLL files with write-access permission for the Everyone group, which allows local users to gain privileges via Trojan horse programs."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-19T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.adobe.com/support/techdocs/332644.html"
        },
        {
          "name": "16451",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/16451"
        },
        {
          "name": "1015577",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1015577"
        },
        {
          "name": "1015579",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1015579"
        },
        {
          "name": "20060131 Windows Access Control Demystified",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/423587/100/0/threaded"
        },
        {
          "name": "VU#953860",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/953860"
        },
        {
          "name": "18698",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18698"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.cs.princeton.edu/~sudhakar/papers/winval.pdf"
        },
        {
          "name": "1015578",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1015578"
        },
        {
          "name": "adobe-insecure-default-permissions(24464)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24464"
        },
        {
          "name": "ADV-2006-0431",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/0431"
        },
        {
          "name": "22908",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/22908"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-0525",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple Adobe products, including (1) Photoshop CS2, (2) Illustrator CS2, and (3) Adobe Help Center, install a large number of .EXE and .DLL files with write-access permission for the Everyone group, which allows local users to gain privileges via Trojan horse programs."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.adobe.com/support/techdocs/332644.html",
              "refsource": "CONFIRM",
              "url": "http://www.adobe.com/support/techdocs/332644.html"
            },
            {
              "name": "16451",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/16451"
            },
            {
              "name": "1015577",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1015577"
            },
            {
              "name": "1015579",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1015579"
            },
            {
              "name": "20060131 Windows Access Control Demystified",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/423587/100/0/threaded"
            },
            {
              "name": "VU#953860",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/953860"
            },
            {
              "name": "18698",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18698"
            },
            {
              "name": "http://www.cs.princeton.edu/~sudhakar/papers/winval.pdf",
              "refsource": "MISC",
              "url": "http://www.cs.princeton.edu/~sudhakar/papers/winval.pdf"
            },
            {
              "name": "1015578",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1015578"
            },
            {
              "name": "adobe-insecure-default-permissions(24464)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24464"
            },
            {
              "name": "ADV-2006-0431",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/0431"
            },
            {
              "name": "22908",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/22908"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-0525",
    "datePublished": "2006-02-02T11:00:00",
    "dateReserved": "2006-02-02T00:00:00",
    "dateUpdated": "2024-08-07T16:41:28.898Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2011-2131
Vulnerability from cvelistv5
Published
2011-08-11 22:00
Modified
2024-08-06 22:53
Severity ?
Summary
Adobe Photoshop 12.0 in Creative Suite 5 (CS5) and 12.1 in Creative Suite 5.1 (CS5.1) allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted GIF file.
References
http://www.us-cert.gov/cas/techalerts/TA11-222A.htmlthird-party-advisory, x_refsource_CERT
http://www.adobe.com/support/security/bulletins/apsb11-22.htmlx_refsource_CONFIRM
http://securityreason.com/securityalert/8347third-party-advisory, x_refsource_SREASON
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T22:53:16.603Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "TA11-222A",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT",
              "x_transferred"
            ],
            "url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.adobe.com/support/security/bulletins/apsb11-22.html"
          },
          {
            "name": "8347",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/8347"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-08-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Adobe Photoshop 12.0 in Creative Suite 5 (CS5) and 12.1 in Creative Suite 5.1 (CS5.1) allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted GIF file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2011-09-22T09:00:00",
        "orgId": "078d4453-3bcd-4900-85e6-15281da43538",
        "shortName": "adobe"
      },
      "references": [
        {
          "name": "TA11-222A",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT"
          ],
          "url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.adobe.com/support/security/bulletins/apsb11-22.html"
        },
        {
          "name": "8347",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/8347"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@adobe.com",
          "ID": "CVE-2011-2131",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Adobe Photoshop 12.0 in Creative Suite 5 (CS5) and 12.1 in Creative Suite 5.1 (CS5.1) allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted GIF file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "TA11-222A",
              "refsource": "CERT",
              "url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html"
            },
            {
              "name": "http://www.adobe.com/support/security/bulletins/apsb11-22.html",
              "refsource": "CONFIRM",
              "url": "http://www.adobe.com/support/security/bulletins/apsb11-22.html"
            },
            {
              "name": "8347",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/8347"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538",
    "assignerShortName": "adobe",
    "cveId": "CVE-2011-2131",
    "datePublished": "2011-08-11T22:00:00",
    "dateReserved": "2011-05-13T00:00:00",
    "dateUpdated": "2024-08-06T22:53:16.603Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2011-08-11 22:55
Modified
2024-11-21 01:27
Severity ?
Summary
Adobe Photoshop 12.0 in Creative Suite 5 (CS5) and 12.1 in Creative Suite 5.1 (CS5.1) allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted GIF file.
Impacted products
Vendor Product Version
adobe creative_suite 5
adobe photoshop 12.0
adobe creative_suite 5.1
adobe photoshop 12.1



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:adobe:creative_suite:5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA7F4015-50EF-4204-B275-796BAE951243",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:photoshop:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "23A48567-6F52-44CB-959E-47DFAF5FACF5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:adobe:creative_suite:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BAD2502D-5226-4157-921E-4D84F2A70E68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:photoshop:12.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5376E1E4-E7B7-415D-9A1D-8CF27C715916",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Adobe Photoshop 12.0 in Creative Suite 5 (CS5) and 12.1 in Creative Suite 5.1 (CS5.1) allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted GIF file."
    },
    {
      "lang": "es",
      "value": "Adobe Photoshop v12.0 en Creative Suite 5 (CS5) y v12.1 en Creative Suite v5.1 (CS5.1) permite a atacantes remotos ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de un archivo GIF creado."
    }
  ],
  "id": "CVE-2011-2131",
  "lastModified": "2024-11-21T01:27:39.217",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.3,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2011-08-11T22:55:00.910",
  "references": [
    {
      "source": "psirt@adobe.com",
      "url": "http://securityreason.com/securityalert/8347"
    },
    {
      "source": "psirt@adobe.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.adobe.com/support/security/bulletins/apsb11-22.html"
    },
    {
      "source": "psirt@adobe.com",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/8347"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.adobe.com/support/security/bulletins/apsb11-22.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html"
    }
  ],
  "sourceIdentifier": "psirt@adobe.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2007-05-18 18:30
Modified
2024-11-21 00:31
Severity ?
Summary
The installer for Adobe Version Cue CS3 Server on Apple Mac OS X, as used in Adobe Creative Suite 3 (CS3), does not re-enable the personal firewall after completing the product installation, which allows remote attackers to bypass intended firewall rules.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:adobe:creative_suite:3.0:*:design_premium:*:*:*:*:*",
              "matchCriteriaId": "E31B5FCD-D79F-4805-8BF9-84AB325C31E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:creative_suite:3.0:*:design_standard:*:*:*:*:*",
              "matchCriteriaId": "4FD632E2-BD2F-4153-A47D-B139A825F362",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:creative_suite:3.0:*:web_premium:*:*:*:*:*",
              "matchCriteriaId": "D2CF17B5-5E1C-4538-BE02-6C75160229A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:creative_suite:3.0:*:web_standard:*:*:*:*:*",
              "matchCriteriaId": "AF2E7AB9-3BF2-45B1-8789-C1881EC9664B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The installer for Adobe Version Cue CS3 Server on Apple Mac OS X, as used in Adobe Creative Suite 3 (CS3), does not re-enable the personal firewall after completing the product installation, which allows remote attackers to bypass intended firewall rules."
    },
    {
      "lang": "es",
      "value": "El instalador para la versi\u00f3n de Adobe Version Cue CS3 Server on Apple Mac OS X, como el utilizado por el Adobe Creative Suite 3 (CS3), no rehabilita el cortafuegos personal despu\u00e9s de completar la instalaci\u00f3n del producto, lo que permite a atacantes remotos evitar intencionadamente la reglas de cortafuegos."
    }
  ],
  "id": "CVE-2007-2682",
  "lastModified": "2024-11-21T00:31:23.940",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-05-18T18:30:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/35868"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25291"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://securitytracker.com/id?1018075"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.adobe.com/support/security/bulletins/apsb07-11.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/24027"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2007/1850"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34342"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/35868"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25291"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://securitytracker.com/id?1018075"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.adobe.com/support/security/bulletins/apsb07-11.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/24027"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/1850"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34342"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2005-06-13 04:00
Modified
2024-11-20 23:54
Severity ?
Summary
Unknown vulnerability in the installation of Adobe License Management Service, as used in Adobe Photoshop CS, Adobe Creative Suite 1.0, and Adobe Premiere Pro 1.5, allows attackers to gain administrator privileges.
Impacted products
Vendor Product Version
adobe creative_suite 1.0
adobe photoshop 8.0
adobe premiere 1.5



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:adobe:creative_suite:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC9C6894-B756-4189-AE82-B234449925DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:photoshop:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0820E48-12AD-4112-BC83-D81045D64AA4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:premiere:1.5:*:pro:*:*:*:*:*",
              "matchCriteriaId": "0A0C3110-C713-497B-AC49-4CCE35E7FD49",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unknown vulnerability in the installation of Adobe License Management Service, as used in Adobe Photoshop CS, Adobe Creative Suite 1.0, and Adobe Premiere Pro 1.5, allows attackers to gain administrator privileges."
    }
  ],
  "id": "CVE-2005-0151",
  "lastModified": "2024-11-20T23:54:31.980",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-06-13T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1014168"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1014169"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1014170"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.adobe.com/support/techdocs/331688.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1014168"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1014169"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1014170"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.adobe.com/support/techdocs/331688.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2006-02-02 11:02
Modified
2024-11-21 00:06
Severity ?
Summary
Multiple Adobe products, including (1) Photoshop CS2, (2) Illustrator CS2, and (3) Adobe Help Center, install a large number of .EXE and .DLL files with write-access permission for the Everyone group, which allows local users to gain privileges via Trojan horse programs.
References
cve@mitre.orghttp://secunia.com/advisories/18698Vendor Advisory
cve@mitre.orghttp://securitytracker.com/id?1015577
cve@mitre.orghttp://securitytracker.com/id?1015578
cve@mitre.orghttp://securitytracker.com/id?1015579
cve@mitre.orghttp://www.adobe.com/support/techdocs/332644.html
cve@mitre.orghttp://www.cs.princeton.edu/~sudhakar/papers/winval.pdf
cve@mitre.orghttp://www.kb.cert.org/vuls/id/953860Third Party Advisory, US Government Resource
cve@mitre.orghttp://www.osvdb.org/22908
cve@mitre.orghttp://www.securityfocus.com/archive/1/423587/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/16451
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/0431Vendor Advisory
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/24464
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18698Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1015577
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1015578
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1015579
af854a3a-2127-422b-91ae-364da2661108http://www.adobe.com/support/techdocs/332644.html
af854a3a-2127-422b-91ae-364da2661108http://www.cs.princeton.edu/~sudhakar/papers/winval.pdf
af854a3a-2127-422b-91ae-364da2661108http://www.kb.cert.org/vuls/id/953860Third Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/22908
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/423587/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/16451
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/0431Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/24464



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:adobe:acrobat:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "465F9134-DD86-4F13-8C39-949BE6E7389A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:acrobat:3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB041EDF-EFF8-4AA6-8D59-411975547534",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:acrobat:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C05F6A5-0FB3-489B-9B8B-64C569C03D7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:acrobat:4.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "AABA4FE3-662B-4956-904D-45086E000890",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:acrobat:4.0.5a:*:*:*:*:*:*:*",
              "matchCriteriaId": "998CD79C-458E-46A8-8261-1C40C53D9FA5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:acrobat:4.0.5c:*:*:*:*:*:*:*",
              "matchCriteriaId": "0155FB0B-7FAD-4388-96C8-A8543B4FDFD9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:acrobat:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "201F059D-33D1-4D9F-9C6F-FC8EB49E4735",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:acrobat:5.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "B025E795-5713-485E-8A15-EBE4451A1A46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:acrobat:5.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDEA946E-B6D2-463B-89D0-F2F37278089E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:acrobat:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "183B5940-2310-4D2E-99F0-9792A801A442",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:acrobat:6.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F8BB13E-2732-4F9E-A588-EA1C00893C8B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:acrobat:6.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5FCDCBF-597B-439C-8D8B-2819FC70C567",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:acrobat:6.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "440B890A-90E9-4456-B92A-856CD17F0C78",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:acrobat:6.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "79BD9D8D-39DA-403E-915D-E1B6A46A6BAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:acrobat:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "FECFC942-4F04-420C-A9B4-AE0C0590317F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:acrobat:7.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F81817F2-1E3A-4A52-88F1-6B614A2A1F0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:acrobat:7.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFFFFF0D-A80F-4B67-BEE2-86868EF7AA37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:acrobat:7.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DC97A87-2652-4AD6-8E10-419A9AC9C245",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:acrobat_reader:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1C92642-7C8D-411A-8726-06A8A6483D65",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:acrobat_reader:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F509566A-6D4A-40C0-8A16-F8765C5DCAAF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:acrobat_reader:4.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "707D7124-6063-4510-80B4-AD9675996F67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:acrobat_reader:4.0.5a:*:*:*:*:*:*:*",
              "matchCriteriaId": "200FFAE3-CC1C-4A11-99AD-377D54A67195",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:acrobat_reader:4.0.5c:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A990E86-07C0-49E2-92D6-55E499F30FAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:acrobat_reader:4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AED985D-60D7-489E-9F1E-CE3C9D985B7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:acrobat_reader:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F0FCA2F-FD7F-4CE5-9D45-324A7EC45105",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:acrobat_reader:5.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF7EAA22-CED2-4379-9465-9562BACB1C20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:acrobat_reader:5.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2402B40-6B72-48B5-A376-DA8D16CA43FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:acrobat_reader:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "ACF742B8-5F7A-487B-835C-756B1BB392F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:acrobat_reader:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0BB7C0C-B1D6-4733-BA91-022A1A7FB2E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:acrobat_reader:6.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B131DB8-4B6A-4AF2-8D5E-B5EA1AEBFB3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:acrobat_reader:6.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B9351C2-16ED-4766-B417-8DB3A8766C2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:acrobat_reader:6.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "74667860-0047-40AD-9468-860591BA9D17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:acrobat_reader:6.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DEA092A-5532-4DCC-B43D-7A8ECF07FA4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E2D0266-6954-4DBA-9EEE-8BF73B39DD61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "24262AFA-2EC8-479E-8922-36DB4243E404",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1E62096-08B2-4722-A492-11E9A441E85B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:acrobat_reader:7.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5370AC6-90EE-48EA-8DBD-54002B102F7C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:creative_suite:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC9C6894-B756-4189-AE82-B234449925DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:creative_suite:1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADA16570-F6F8-4FA7-B88B-C3890F040C0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:creative_suite:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C51CA73D-6CD2-4597-A0EF-39C748EBA508",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:illustrator:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "541B9668-6BEB-49BB-9C75-44D2595B2E28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:illustrator:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "88C95931-0247-4605-B2C5-35EB7D654B4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:illustrator:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1AA37B5-DE58-4856-9EE8-8FFAF6CC9E1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:illustrator:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BF8CE1A-B768-4A77-9A46-8F0158E44D91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:illustrator:cs:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1FFC4D8-B7D1-4D74-8C00-1AC11A7373DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:illustrator:cs3:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2544447-313B-42DD-831B-E1AED3B6086F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:indesign:cs:*:*:*:*:*:*:*",
              "matchCriteriaId": "FFF91AF9-BFDB-4618-90FE-875FF8FFA3DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:indesign:cs3:*:*:*:*:*:*:*",
              "matchCriteriaId": "31870168-D8E9-4439-9C9D-994F35FEFB8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:pagemaker:6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DBC38A3-0BE2-4862-B5F1-0340FB21BCC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:pagemaker:6.5:*:plus:*:*:*:*:*",
              "matchCriteriaId": "7E584707-1A7C-492C-96A5-CDB8D77DCC95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:pagemaker:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4748647-13D5-48DF-9DBE-75EBFF8BC647",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:pagemaker:7.0:*:plus:*:*:*:*:*",
              "matchCriteriaId": "5594EAAC-5AC9-4CF4-B664-AB654B99D548",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:photoshop:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD03FB10-858D-4B2B-B86A-46AEBF7DA63E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:photoshop:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0820E48-12AD-4112-BC83-D81045D64AA4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:photoshop:9.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F1D2452-C141-4A9E-ACA9-61A44FB63302",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:photoshop:le:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C0A4519-88EA-448D-840E-8679977BA7F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:premiere:1.5:*:pro:*:*:*:*:*",
              "matchCriteriaId": "0A0C3110-C713-497B-AC49-4CCE35E7FD49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:version_cue:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABD4E1CD-8226-4308-8B6F-65B7AFB1CE32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:version_cue:1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7ABC546A-EE59-47E3-A0F0-9210050121D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:version_cue:gold:*:mac_os_x:*:*:*:*:*",
              "matchCriteriaId": "A10F07F5-5C99-40D5-9C15-C1DDA8D98B7C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple Adobe products, including (1) Photoshop CS2, (2) Illustrator CS2, and (3) Adobe Help Center, install a large number of .EXE and .DLL files with write-access permission for the Everyone group, which allows local users to gain privileges via Trojan horse programs."
    }
  ],
  "id": "CVE-2006-0525",
  "lastModified": "2024-11-21T00:06:39.823",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": true,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-02-02T11:02:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/18698"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1015577"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1015578"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1015579"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.adobe.com/support/techdocs/332644.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.cs.princeton.edu/~sudhakar/papers/winval.pdf"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/953860"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/22908"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/423587/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/16451"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2006/0431"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24464"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/18698"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1015577"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1015578"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1015579"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.adobe.com/support/techdocs/332644.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.cs.princeton.edu/~sudhakar/papers/winval.pdf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/953860"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/22908"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/423587/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/16451"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2006/0431"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24464"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}