Action not permitted
Modal body text goes here.
CVE-2010-1285
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T01:21:17.661Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2010-1636", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/1636" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-15.html" }, { "name": "1024159", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024159" }, { "name": "41232", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/41232" }, { "name": "oval:org.mitre.oval:def:6725", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6725" }, { "name": "20100630 VUPEN Security Research - Adobe Acrobat and Reader \"newclass\" Memory Corruption Vulnerability (CVE-2010-1285)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/512099" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-06-29T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow attackers to execute arbitrary code via unspecified manipulations involving the newclass (0x58) operator and an \"invalid pointer vulnerability\" that triggers memory corruption, a different vulnerability than CVE-2010-2168 and CVE-2010-2201." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "ADV-2010-1636", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/1636" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-15.html" }, { "name": "1024159", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024159" }, { "name": "41232", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/41232" }, { "name": "oval:org.mitre.oval:def:6725", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6725" }, { "name": "20100630 VUPEN Security Research - Adobe Acrobat and Reader \"newclass\" Memory Corruption Vulnerability (CVE-2010-1285)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/512099" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-1285", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow attackers to execute arbitrary code via unspecified manipulations involving the newclass (0x58) operator and an \"invalid pointer vulnerability\" that triggers memory corruption, a different vulnerability than CVE-2010-2168 and CVE-2010-2201." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2010-1636", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/1636" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-15.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-15.html" }, { "name": "1024159", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1024159" }, { "name": "41232", "refsource": "BID", "url": "http://www.securityfocus.com/bid/41232" }, { "name": "oval:org.mitre.oval:def:6725", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6725" }, { "name": "20100630 VUPEN Security Research - Adobe Acrobat and Reader \"newclass\" Memory Corruption Vulnerability (CVE-2010-1285)", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/512099" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2010-1285", "datePublished": "2010-06-30T18:00:00", "dateReserved": "2010-04-06T00:00:00", "dateUpdated": "2024-08-07T01:21:17.661Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2010-1285\",\"sourceIdentifier\":\"psirt@adobe.com\",\"published\":\"2010-06-30T18:30:01.380\",\"lastModified\":\"2018-10-30T16:25:16.967\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow attackers to execute arbitrary code via unspecified manipulations involving the newclass (0x58) operator and an \\\"invalid pointer vulnerability\\\" that triggers memory corruption, a different vulnerability than CVE-2010-2168 and CVE-2010-2201.\"},{\"lang\":\"es\",\"value\":\"Adobe Reader y Acrobat versi\u00f3n 9.x anterior a 9.3.3 y versi\u00f3n 8.x anterior a 8.2.3 en Windows y Mac OS X, permiten a los atacantes ejecutar c\u00f3digo arbitrario por medio de manipulaciones no especificadas que involucre el operador newclass (0x58) y una \\\"invalid pointer vulnerability\\\" que desencadena corrupci\u00f3n de memoria, esta es una vulnerabilidad diferente a los CVE-2010-2168 y CVE-2010-2201.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:C/I:C/A:C\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\",\"baseScore\":9.3},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.6,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":true,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"},{\"lang\":\"en\",\"value\":\"CWE-399\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AA53564-9ACD-4CFB-9AAC-A77440026A57\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7EC46E3-77B7-4455-B3E0-A45C6B69B3DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F475858-DCE2-4C93-A51A-04718DF17593\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88687272-4CD0-42A2-B727-C322ABDE3549\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:9.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E5C4FA4-3786-47AF-BD7D-8E75927EB3AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:9.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B35CC915-EEE3-4E86-9E09-1893C725E07B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:9.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76201694-E5C5-4CA3-8919-46937AFDAAE3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:9.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"397AB988-1C2C-4247-9B34-806094197CB5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:9.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FA0B8C3-8060-4685-A241-9852BD63B7A0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FF5999A-9D12-4CDD-8DE9-A89C10B2D574\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CF61F35-5905-4BA9-AD7E-7DB261D2F256\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"562772F1-1627-438E-A6B8-7D1AA5536086\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27D5AF92-A8E1-41BD-B20A-EB26BB6AD4DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F25C9167-C6D4-4264-9197-50878EDA2D96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD1D7308-09E9-42B2-8836-DC2326C62A9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:9.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5C251D2-4C9B-4029-8BED-0FCAED3B8E89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:9.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2432AC17-5378-4C61-A775-5172FD44EC03\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:9.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6BA82F4-470D-4A46-89B2-D2F3C8FA31C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:9.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39EDED39-664F-4B68-B422-2CCCA3B83550\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:9.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B508C5CE-1386-47B3-B301-B78DBB3A75D9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FF5999A-9D12-4CDD-8DE9-A89C10B2D574\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CF61F35-5905-4BA9-AD7E-7DB261D2F256\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26AE76F7-D7F6-4AF2-A5C6-708B5642C288\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"749FFB51-65D4-4A4B-95F3-742440276897\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:8.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8665E53-EC1E-4B95-9064-2565BC12113E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:8.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24218FDA-F9DA-465A-B5D5-76A55C7EE04E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:8.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2C5F1C5-85CD-47B9-897F-E51D6902AF72\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:8.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0E190FF-3EBC-44AB-8072-4D964E843E8A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:8.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A624D44-C135-4ED3-9BA4-F4F8A044850B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:8.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B95C0A99-42E4-40A9-BF61-507E4E4DC052\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:8.1.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B9F55CC-3681-4A67-99D1-3F40447392D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9C0AC89-804B-44A1-929A-118993B6BAA7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:8.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39B174C3-1BA6-4654-BFA4-CC126454E147\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:8.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6ACDAA2B-3977-4590-9F16-5DDB6FF6545B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FF5999A-9D12-4CDD-8DE9-A89C10B2D574\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CF61F35-5905-4BA9-AD7E-7DB261D2F256\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"996EB48E-D2A8-49E4-915A-EBDE26A9FB94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97E20936-EE31-4CEB-A710-3165A28BAD69\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:8.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5BD9952C-A1D0-4DFB-A292-9B86D7EAE5FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:8.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5BEA847-A71E-4336-AB67-B3C38847C1C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:8.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39F6994B-6969-485B-9286-2592B11A47BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:8.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC533775-B52E-43F0-BF19-1473BE36232D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:8.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18D1C85E-42CC-46F2-A7B6-DAC3C3995330\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:8.1.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4670451-511E-496C-A78A-887366E1E992\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:8.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35994F76-CD13-4301-9134-FC0CBEA37D97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:8.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FB61191-F955-4DE6-A86B-36E031DE1F99\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FF5999A-9D12-4CDD-8DE9-A89C10B2D574\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CF61F35-5905-4BA9-AD7E-7DB261D2F256\"}]}]}],\"references\":[{\"url\":\"http://www.adobe.com/support/security/bulletins/apsb10-15.html\",\"source\":\"psirt@adobe.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/archive/1/512099\",\"source\":\"psirt@adobe.com\"},{\"url\":\"http://www.securityfocus.com/bid/41232\",\"source\":\"psirt@adobe.com\"},{\"url\":\"http://www.securitytracker.com/id?1024159\",\"source\":\"psirt@adobe.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2010/1636\",\"source\":\"psirt@adobe.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6725\",\"source\":\"psirt@adobe.com\"}]}}" } }
gsd-2010-1285
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2010-1285", "description": "Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow attackers to execute arbitrary code via unspecified manipulations involving the newclass (0x58) operator and an \"invalid pointer vulnerability\" that triggers memory corruption, a different vulnerability than CVE-2010-2168 and CVE-2010-2201.", "id": "GSD-2010-1285", "references": [ "https://www.suse.com/security/cve/CVE-2010-1285.html", "https://access.redhat.com/errata/RHSA-2010:0503" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2010-1285" ], "details": "Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow attackers to execute arbitrary code via unspecified manipulations involving the newclass (0x58) operator and an \"invalid pointer vulnerability\" that triggers memory corruption, a different vulnerability than CVE-2010-2168 and CVE-2010-2201.", "id": "GSD-2010-1285", "modified": "2023-12-13T01:21:32.487102Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-1285", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow attackers to execute arbitrary code via unspecified manipulations involving the newclass (0x58) operator and an \"invalid pointer vulnerability\" that triggers memory corruption, a different vulnerability than CVE-2010-2168 and CVE-2010-2201." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2010-1636", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/1636" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb10-15.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb10-15.html" }, { "name": "1024159", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1024159" }, { "name": "41232", "refsource": "BID", "url": "http://www.securityfocus.com/bid/41232" }, { "name": "oval:org.mitre.oval:def:6725", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6725" }, { "name": "20100630 VUPEN Security Research - Adobe Acrobat and Reader \"newclass\" Memory Corruption Vulnerability (CVE-2010-1285)", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/512099" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:9.1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:9.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:9.3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:9.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:9.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:9.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:9.3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:9.1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:9.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:9.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:8.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:8.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:8.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:8.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:8.1.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:8.1.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:8.1.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:8.1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:8.1.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:8.1.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:8.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:8.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:8.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:8.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:8.1.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:8.1.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:8.1.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:8.1.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:8.1.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:8.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2010-1285" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow attackers to execute arbitrary code via unspecified manipulations involving the newclass (0x58) operator and an \"invalid pointer vulnerability\" that triggers memory corruption, a different vulnerability than CVE-2010-2168 and CVE-2010-2201." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-20" }, { "lang": "en", "value": "CWE-399" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.adobe.com/support/security/bulletins/apsb10-15.html", "refsource": "CONFIRM", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb10-15.html" }, { "name": "41232", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/41232" }, { "name": "20100630 VUPEN Security Research - Adobe Acrobat and Reader \"newclass\" Memory Corruption Vulnerability (CVE-2010-1285)", "refsource": "BUGTRAQ", "tags": [], "url": "http://www.securityfocus.com/archive/1/512099" }, { "name": "ADV-2010-1636", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2010/1636" }, { "name": "1024159", "refsource": "SECTRACK", "tags": [], "url": "http://www.securitytracker.com/id?1024159" }, { "name": "oval:org.mitre.oval:def:6725", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6725" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": true } }, "lastModifiedDate": "2018-10-30T16:25Z", "publishedDate": "2010-06-30T18:30Z" } } }
ghsa-96r2-72m9-m58r
Vulnerability from github
Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow attackers to execute arbitrary code via unspecified manipulations involving the newclass (0x58) operator and an "invalid pointer vulnerability" that triggers memory corruption, a different vulnerability than CVE-2010-2168 and CVE-2010-2201.
{ "affected": [], "aliases": [ "CVE-2010-1285" ], "database_specific": { "cwe_ids": [ "CWE-20" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2010-06-30T18:30:00Z", "severity": "HIGH" }, "details": "Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow attackers to execute arbitrary code via unspecified manipulations involving the newclass (0x58) operator and an \"invalid pointer vulnerability\" that triggers memory corruption, a different vulnerability than CVE-2010-2168 and CVE-2010-2201.", "id": "GHSA-96r2-72m9-m58r", "modified": "2022-05-02T06:21:08Z", "published": "2022-05-02T06:21:08Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1285" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6725" }, { "type": "WEB", "url": "http://www.adobe.com/support/security/bulletins/apsb10-15.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/512099" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/41232" }, { "type": "WEB", "url": "http://www.securitytracker.com/id?1024159" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2010/1636" } ], "schema_version": "1.4.0", "severity": [] }
var-201006-1200
Vulnerability from variot
Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow attackers to execute arbitrary code via unspecified manipulations involving the newclass (0x58) operator and an "invalid pointer vulnerability" that triggers memory corruption, a different vulnerability than CVE-2010-2168 and CVE-2010-2201. This vulnerability CVE-2010-2168 and CVE-2010-2201 Is a different vulnerability.An attacker could execute arbitrary code. Adobe Acrobat and Reader are prone to a remote code-execution vulnerability. Adobe Reader and Acrobat versions prior to and including 9.3.2 and 8.2.2 are affected. NOTE: This issue was previously covered in BID 41130 (Adobe Acrobat and Reader Prior to 9.3.3 Multiple Remote Vulnerabilities) but has been given its own record to better document it. They are used to create, view, search, digitally sign, verify, print, and collaborate on Adobe PDF files."
II.
This vulnerability is caused by a memory corruption error when processing the "newclass" operator (bytecode 0x58) while parsing Flash content within a PDF document, which could be exploited by attackers to execute arbitrary code by tricking a user into opening a malicious PDF file. Binary Analysis & Proof-of-concept
In-depth binary analysis of the vulnerability and a code execution exploit are available through the VUPEN Binary Analysis & Exploits Service :
http://www.vupen.com/english/services/ba-index.php
V.
VI. CREDIT
This vulnerability was discovered by Nicolas Joly of VUPEN Security
VII. ABOUT VUPEN Security
VUPEN is a leading IT security research company providing vulnerability management and security intelligence solutions which enable enterprises and institutions to eliminate vulnerabilities before they can be exploited, ensure security policy compliance and meaningfully measure and manage risks.
Governmental and federal agencies, and global enterprises in the financial services, insurance, manufacturing and technology industries rely on VUPEN to improve their security, prioritize resources, cut time and costs, and stay ahead of the latest threats.
-
VUPEN Vulnerability Notification Service (VNS) : http://www.vupen.com/english/services/vns-index.php
-
VUPEN Binary Analysis & Exploits Service (BAE) : http://www.vupen.com/english/services/ba-index.php
-
VUPEN Threat Protection Program for Govs (TPP) : http://www.vupen.com/english/services/tpp-index.php
-
VUPEN Web Application Security Scanner (WASS) : http://www.vupen.com/english/services/wass-index.php
VIII. REFERENCES
http://www.vupen.com/english/advisories/2010/1636 http://www.adobe.com/support/security/bulletins/apsb10-15.html http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1285
IX. DISCLOSURE TIMELINE
2009-09-06 - Vendor notified 2009-09-06 - Vendor response 2010-03-08 - Status update received 2010-06-20 - Status update received 2010-06-29 - Coordinated public Disclosure . - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201009-05
http://security.gentoo.org/
Severity: Normal Title: Adobe Reader: Multiple vulnerabilities Date: September 07, 2010 Bugs: #297385, #306429, #313343, #322857 ID: 201009-05
Synopsis
Multiple vulnerabilities in Adobe Reader might result in the execution of arbitrary code or other attacks. For further information please consult the CVE entries and the Adobe Security Bulletins referenced below.
Workaround
There is no known workaround at this time.
Resolution
All Adobe Reader users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=app-text/acroread-9.3.4"
References
[ 1 ] APSA10-01 http://www.adobe.com/support/security/advisories/apsa10-01.html [ 2 ] APSB10-02 http://www.adobe.com/support/security/bulletins/apsb10-02.html [ 3 ] APSB10-07 http://www.adobe.com/support/security/bulletins/apsb10-07.html [ 4 ] APSB10-09 http://www.adobe.com/support/security/bulletins/apsb10-09.html [ 5 ] APSB10-14 http://www.adobe.com/support/security/bulletins/apsb10-14.html [ 6 ] APSB10-16 http://www.adobe.com/support/security/bulletins/apsb10-16.html [ 7 ] CVE-2009-3953 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3953 [ 8 ] CVE-2009-4324 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4324 [ 9 ] CVE-2010-0186 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0186 [ 10 ] CVE-2010-0188 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0188 [ 11 ] CVE-2010-0190 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0190 [ 12 ] CVE-2010-0191 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0191 [ 13 ] CVE-2010-0192 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0192 [ 14 ] CVE-2010-0193 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0193 [ 15 ] CVE-2010-0194 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0194 [ 16 ] CVE-2010-0195 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0195 [ 17 ] CVE-2010-0196 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0196 [ 18 ] CVE-2010-0197 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0197 [ 19 ] CVE-2010-0198 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0198 [ 20 ] CVE-2010-0199 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0199 [ 21 ] CVE-2010-0201 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0201 [ 22 ] CVE-2010-0202 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0202 [ 23 ] CVE-2010-0203 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0203 [ 24 ] CVE-2010-0204 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0204 [ 25 ] CVE-2010-1241 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1241 [ 26 ] CVE-2010-1285 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1285 [ 27 ] CVE-2010-1295 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1295 [ 28 ] CVE-2010-1297 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1297 [ 29 ] CVE-2010-2168 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2168 [ 30 ] CVE-2010-2201 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2201 [ 31 ] CVE-2010-2202 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2202 [ 32 ] CVE-2010-2203 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2203 [ 33 ] CVE-2010-2204 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2204 [ 34 ] CVE-2010-2205 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2205 [ 35 ] CVE-2010-2206 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2206 [ 36 ] CVE-2010-2207 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2207 [ 37 ] CVE-2010-2208 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2208 [ 38 ] CVE-2010-2209 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2209 [ 39 ] CVE-2010-2210 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2210 [ 40 ] CVE-2010-2211 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2211 [ 41 ] CVE-2010-2212 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2212
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201009-05.xml
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2010 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
. ----------------------------------------------------------------------
Secunia CSI integrated with Microsoft WSUS and Microsoft SCCM for 3rd party Patch Management
Free webinars
http://secunia.com/vulnerability_scanning/corporate/webinars/
TITLE: Adobe Flash Player Unspecified Code Execution Vulnerability
SECUNIA ADVISORY ID: SA40026
VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/40026/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=40026
RELEASE DATE: 2010-06-05
DISCUSS ADVISORY: http://secunia.com/advisories/40026/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)
http://secunia.com/advisories/40026/
ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=40026
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION: A vulnerability has been reported in Adobe Flash Player, which can be exploited by malicious people to compromise a user's system.
The vulnerability is caused due to an unspecified error. No more information is currently available.
The vulnerability is reported in version 10.0.45.2 and prior 10.0.x and 9.0.x versions for Windows, Macintosh, Linux, and Solaris.
NOTE: The vulnerability is reportedly being actively exploited.
SOLUTION: Reportedly, the latest version 10.1 Release Candidate is not affected.
Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
PROVIDED AND/OR DISCOVERED BY: Reported as a 0-day.
ORIGINAL ADVISORY: Adobe: http://www.adobe.com/support/security/advisories/apsa10-01.html
OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
DEEP LINKS: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
EXPLOIT: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
National Cyber Alert System
Technical Cyber Security Alert TA10-159A
Adobe Flash, Reader, and Acrobat Vulnerability
Original release date: June 08, 2010 Last revised: -- Source: US-CERT
Systems Affected
* Adobe Flash Player 10.0.45.2 and earlier 10.x versions
* Adobe Flash Player 9.0.262 and earlier 9.x versions
* Adobe Reader 9.3.2 and earlier 9.x versions
* Adobe Acrobat 9.3.2 and earlier 9.x versions
Other Adobe products that support Flash may also be vulnerable. This
vulnerability affects Flash Player, Reader, Acrobat, and possibly other products that support Flash.
I. It may also affect other products that independently support Flash, such as Photoshop, Photoshop Lightroom, Freehand MX, and Fireworks.
An attacker could exploit this vulnerability by convincing a user to open specially crafted Flash content. Flash content is commonly hosted on a web page, but it can also be embedded in PDF and other documents or provided as a stand-alone file.
II.
III. Solution
Update
Adobe Security Advisory APSA10-01 suggests updating to the release candidate of Flash Player 10.1.
Disable Flash in your web browser
Uninstall Flash or restrict which sites are allowed to run Flash. To the extent possible, only run trusted Flash content on trusted domains. For more information, see Securing Your Web Browser.
Disable Flash in Adobe Reader and Acrobat
Disabling Flash in Adobe Reader will mitigate attacks that rely on Flash content embedded in a PDF file. Disabling 3D & Multimedia support does not directly address the vulnerability, but it does provide additional mitigation and results in a more user-friendly error message instead of a crash. To disable Flash and 3D & Multimedia support in Adobe Reader 9, delete, rename, or remove access to these files:
Microsoft Windows
"%ProgramFiles%\Adobe\Reader 9.0\Reader\authplay.dll"
"%ProgramFiles%\Adobe\Reader 9.0\Reader\rt3d.dll"
Apple Mac OS X
"/Applications/Adobe Reader 9/Adobe
Reader.app/Contents/Frameworks/AuthPlayLib.bundle"
"/Applications/Adobe Reader 9/Adobe
Reader.app/Contents/Frameworks/Adobe3D.framework"
GNU/Linux (locations may vary among distributions)
"/opt/Adobe/Reader9/Reader/intellinux/lib/libauthplay.so"
"/opt/Adobe/Reader9/Reader/intellinux/lib/librt3d.so"
File locations may be different for Adobe Acrobat or other Adobe products that include Flash and 3D & Multimedia support. Disabling these plugins will reduce functionality and will not protect against Flash content hosted on websites. Depending on the update schedule for products other than Flash Player, consider leaving Flash and 3D & Multimedia support disabled unless they are absolutely required.
Prevent Internet Explorer from automatically opening PDF documents
The installer for Adobe Reader and Acrobat configures Internet Explorer to automatically open PDF files without any user interaction. This behavior can be reverted to a safer option that prompts the user by importing the following as a .REG file:
Windows Registry Editor Version 5.00
[HKEY_CLASSES_ROOT\AcroExch.Document.7]
"EditFlags"=hex:00,00,00,00
Disable the display of PDF documents in the web browser
Preventing PDF documents from opening inside a web browser will partially mitigate this vulnerability. If this workaround is applied, it may also mitigate future vulnerabilities.
To prevent PDF documents from automatically being opened in a web browser, do the following:
1.
2. Open the Edit menu.
3. Choose the Preferences option.
4. Choose the Internet section.
5. Uncheck the "Display PDF in browser" checkbox.
Disable JavaScript in Adobe Reader and Acrobat
Disabling JavaScript provides some additional protection against attacks. Acrobat JavaScript can be disabled using the Preferences menu (Edit -> Preferences -> JavaScript; uncheck Enable Acrobat JavaScript).
Enable DEP in Microsoft Windows
Consider enabling Data Execution Prevention (DEP) in supported versions of Windows. DEP should not be treated as a complete workaround, but it can mitigate the execution of attacker-supplied code in some cases. Microsoft has published detailed technical information about DEP in Security Research & Defense blog posts "Understanding DEP as a mitigation technology" part 1 and part 2. Use of DEP should be considered in conjunction with the application of patches or other mitigations described in this document.
Do not access PDF documents from untrusted sources
Do not open unfamiliar or unexpected PDF documents, particularly those hosted on websites or delivered as email attachments. Please see Cyber Security Tip ST04-010.
IV. References
-
Security Advisory for Flash Player, Adobe Reader and Acrobat - http://www.adobe.com/support/security/advisories/apsa10-01.html
-
Adobe Labs - Flash Player 10 pre-release - http://labs.adobe.com/technologies/flashplayer10/
-
US-CERT Vulnerability Note VU#486225 - http://www.kb.cert.org/vuls/id/486225
-
Securing Your Web Browser - http://www.us-cert.gov/reading_room/securing_browser/
-
Understanding DEP as a mitigation technology part 1 - http://blogs.technet.com/b/srd/archive/2009/06/05/understanding-dep-as-a-mitigation-technology-part-1.aspx
-
Understanding DEP as a mitigation technology part 2 - http://blogs.technet.com/b/srd/archive/2009/06/12/understanding-dep-as-a-mitigation-technology-part-2.aspx
The most recent version of this document can be found at:
<http://www.us-cert.gov/cas/techalerts/TA10-159A.html>
Feedback can be directed to US-CERT Technical Staff. Please send email to cert@cert.org with "TA10-159A Feedback VU#486225" in the subject.
For instructions on subscribing to or unsubscribing from this mailing list, visit http://www.us-cert.gov/cas/signup.html.
Produced 2010 by US-CERT, a government organization.
Terms of use:
<http://www.us-cert.gov/legal.html>
Revision History
June 08, 2010: Initial release
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.5 (GNU/Linux)
iQEVAwUBTA65yT6pPKYJORa3AQLS9wf/fh+7IwRtBvoPgn8pYeOsVheLkbVLWC3W miWUnY1acuPTwZzG5JcAldRHksFkx1j0mMEvp4PhtiTr51JFPi4XgDfrG4cEcVaw nuAqEV+hLAWZkMex/jWxBV+85tZqKN0kiUr3bq5DPsdkhjV7c2MFfS8BSxLXLuPm OFAXPT+XFldq6MJhYUOtWT1CIz6PNPfo68KmZaUThjdqkkBW3HQu90OSRf2c6M/u V6KBQf7QuhpPqYUqAZU6ZUNEfL/7g2BwvuPjUMlgE5N+Z8EYnhyhu0qDtZeLUcXA 2gH31VEr79DUHJqpb9jk61bi5Dm4gjHeLHoTAwu0IrduZzXvWncfIg== =ZPZM -----END PGP SIGNATURE-----
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201006-1200", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "acrobat", "scope": "eq", "trust": 1.9, "vendor": "adobe", "version": "9.1.1" }, { "model": "acrobat reader", "scope": "eq", "trust": 1.6, "vendor": "adobe", "version": "8.1.7" }, { "model": "acrobat", "scope": "eq", "trust": 1.6, "vendor": "adobe", "version": "9.1" }, { "model": "acrobat", "scope": "eq", "trust": 1.6, "vendor": "adobe", "version": "9.1.2" }, { "model": "acrobat reader", "scope": "eq", "trust": 1.6, "vendor": "adobe", "version": "8.1.6" }, { "model": "acrobat reader", "scope": "eq", "trust": 1.6, "vendor": "adobe", "version": "8.2.2" }, { "model": "acrobat reader", "scope": "eq", "trust": 1.6, "vendor": "adobe", "version": "8.1.5" }, { "model": "acrobat reader", "scope": "eq", "trust": 1.6, "vendor": "adobe", "version": "8.2.1" }, { "model": "acrobat", "scope": "eq", "trust": 1.6, "vendor": "adobe", "version": "9.0" }, { "model": "acrobat reader", "scope": "eq", "trust": 1.6, "vendor": "adobe", "version": "8.1.4" }, { "model": "acrobat", "scope": "eq", "trust": 1.3, "vendor": "adobe", "version": "9.3.2" }, { "model": "acrobat", "scope": "eq", "trust": 1.3, "vendor": "adobe", "version": "9.3.1" }, { "model": "acrobat", "scope": "eq", "trust": 1.3, "vendor": "adobe", "version": "8.2.2" }, { "model": "acrobat", "scope": "eq", "trust": 1.3, "vendor": "adobe", "version": "9.3" }, { "model": "acrobat", "scope": "eq", "trust": 1.3, "vendor": "adobe", "version": "9.2" }, { "model": "acrobat", "scope": "eq", "trust": 1.0, "vendor": "adobe", "version": "8.2" }, { "model": "acrobat reader", "scope": "eq", "trust": 1.0, "vendor": "adobe", "version": "9.3.1" }, { "model": "acrobat", "scope": "eq", "trust": 1.0, "vendor": "adobe", "version": "8.1.2" }, { "model": "acrobat", "scope": "eq", "trust": 1.0, "vendor": "adobe", "version": "8.1.3" }, { "model": "acrobat reader", "scope": "eq", "trust": 1.0, "vendor": "adobe", "version": "8.1.2" }, { "model": "acrobat", "scope": "eq", "trust": 1.0, "vendor": "adobe", "version": "8.1.7" }, { "model": "acrobat reader", "scope": "eq", "trust": 1.0, "vendor": "adobe", "version": "9.2" }, { "model": "acrobat", "scope": "eq", "trust": 1.0, "vendor": "adobe", "version": "9.1.3" }, { "model": "acrobat reader", "scope": "eq", "trust": 1.0, "vendor": "adobe", "version": "9.1.1" }, { "model": "acrobat reader", "scope": "eq", "trust": 1.0, "vendor": "adobe", "version": "9.1.3" }, { "model": "acrobat", "scope": "eq", "trust": 1.0, "vendor": "adobe", "version": "8.1.6" }, { "model": "acrobat reader", "scope": "eq", "trust": 1.0, "vendor": "adobe", "version": "9.1.2" }, { "model": "acrobat", "scope": "eq", "trust": 1.0, "vendor": "adobe", "version": "8.2.1" }, { "model": "acrobat", "scope": "eq", "trust": 1.0, "vendor": "adobe", "version": "8.1" }, { "model": "acrobat reader", "scope": "eq", "trust": 1.0, "vendor": "adobe", "version": "9.0" }, { "model": "acrobat", "scope": "eq", "trust": 1.0, "vendor": "adobe", "version": "8.0" }, { "model": "acrobat reader", "scope": "eq", "trust": 1.0, "vendor": "adobe", "version": "8.1" }, { "model": "acrobat reader", "scope": "eq", "trust": 1.0, "vendor": "adobe", "version": "8.0" }, { "model": "acrobat", "scope": "eq", "trust": 1.0, "vendor": "adobe", "version": "8.1.4" }, { "model": "acrobat reader", "scope": "eq", "trust": 1.0, "vendor": "adobe", "version": "9.3.2" }, { "model": "acrobat reader", "scope": "eq", "trust": 1.0, "vendor": "adobe", "version": "9.1" }, { "model": "acrobat reader", "scope": "eq", "trust": 1.0, "vendor": "adobe", "version": "9.3" }, { "model": "acrobat", "scope": "eq", "trust": 1.0, "vendor": "adobe", "version": "8.1.5" }, { "model": "acrobat", "scope": "eq", "trust": 1.0, "vendor": "adobe", "version": "8.1.1" }, { "model": "acrobat reader", "scope": "eq", "trust": 1.0, "vendor": "adobe", "version": "8.1.1" }, { "model": "acrobat", "scope": "lte", "trust": 0.8, "vendor": "adobe", "version": "9.3.2" }, { "model": "reader", "scope": "lte", "trust": 0.8, "vendor": "adobe", "version": "9.3.2" }, { "model": "enterprise linux extras", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4 extras" }, { "model": "enterprise linux extras", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4.8.z extras" }, { "model": "rhel desktop supplementary", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "5 (client)" }, { "model": "rhel supplementary", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "5 (server)" }, { "model": "rhel supplementary eus", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "5.4.z (server)" }, { "model": "linux enterprise desktop sp1", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11" }, { "model": "linux enterprise desktop", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11" }, { "model": "linux enterprise desktop sp3", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "11.2" }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "11.1" }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "11.0" }, { "model": "enterprise linux ws extras", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "enterprise linux extras", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "enterprise linux es extras", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "enterprise linux as extras", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "desktop extras", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "hat enterprise linux supplementary server", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "5" }, { "model": "hat enterprise linux desktop supplementary client", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "5" }, { "model": "linux", "scope": null, "trust": 0.3, "vendor": "gentoo", "version": null }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.3.2" }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.3.1" }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.1.3" }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.1.2" }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.1.1" }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.2.2" }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.2.1" }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.1.7" }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.1.6" }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.1.5" }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.1.4" }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.1.3" }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.1.2" }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.1.1" }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.1.4" }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.1.3" }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.1.2" }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.1.1" }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.9" }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.8" }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.7" }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.6" }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.5" }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.4" }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.3" }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.2" }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.1" }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0" }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.3" }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.2" }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.1" }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9" }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.2" }, { "model": "reader security updat", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.1.2" }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.1" }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.0" }, { "model": "reader", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.1" }, { "model": "acrobat standard", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.3.2" }, { "model": "acrobat standard", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.3.1" }, { "model": "acrobat standard", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.1.3" }, { "model": "acrobat standard", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.1.2" }, { "model": "acrobat standard", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.2.2" }, { "model": "acrobat standard", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.2.1" }, { "model": "acrobat standard", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.1.7" }, { "model": "acrobat standard", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.1.6" }, { "model": "acrobat standard", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.1.4" }, { "model": "acrobat standard", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.1.3" }, { "model": "acrobat standard", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.1.2" }, { "model": "acrobat standard", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.1.1" }, { "model": "acrobat standard", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.1.4" }, { "model": "acrobat standard", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.1.3" }, { "model": "acrobat standard", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.1.1" }, { "model": "acrobat standard", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.8" }, { "model": "acrobat standard", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.7" }, { "model": "acrobat standard", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.6" }, { "model": "acrobat standard", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.5" }, { "model": "acrobat standard", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.4" }, { "model": "acrobat standard", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.3" }, { "model": "acrobat standard", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.2" }, { "model": "acrobat standard", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.1" }, { "model": "acrobat standard", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0" }, { "model": "acrobat standard", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.3" }, { "model": "acrobat standard", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.2" }, { "model": "acrobat standard", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.1" }, { "model": "acrobat standard", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9" }, { "model": "acrobat standard", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.2" }, { "model": "acrobat standard", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.1" }, { "model": "acrobat standard", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.0" }, { "model": "acrobat standard", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.1" }, { "model": "acrobat professional", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.3.2" }, { "model": "acrobat professional", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.3.1" }, { "model": "acrobat professional", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.1.3" }, { "model": "acrobat professional", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.1.2" }, { "model": "acrobat professional", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.2.2" }, { "model": "acrobat professional", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.2.1" }, { "model": "acrobat professional", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.1.7" }, { "model": "acrobat professional", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.1.6" }, { "model": "acrobat professional", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.1.4" }, { "model": "acrobat professional", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.1.3" }, { "model": "acrobat professional", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.1.2" }, { "model": "acrobat professional", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.1.1" }, { "model": "acrobat professional", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.1.4" }, { "model": "acrobat professional", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.1.3" }, { "model": "acrobat professional", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.1.1" }, { "model": "acrobat professional", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.9" }, { "model": "acrobat professional", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.8" }, { "model": "acrobat professional", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.7" }, { "model": "acrobat professional", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.6" }, { "model": "acrobat professional", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.5" }, { "model": "acrobat professional", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.4" }, { "model": "acrobat professional", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.3" }, { "model": "acrobat professional", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.2" }, { "model": "acrobat professional", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.1" }, { "model": "acrobat professional", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0" }, { "model": "acrobat professional", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.3" }, { "model": "acrobat professional", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.2" }, { "model": "acrobat professional", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.1" }, { "model": "acrobat professional", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9" }, { "model": "acrobat professional", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.2" }, { "model": "acrobat professional security updat", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.1.2" }, { "model": "acrobat professional", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.1" }, { "model": "acrobat professional", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.0" }, { "model": "acrobat professional", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.1" }, { "model": "acrobat professional", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "6.0" }, { "model": "acrobat", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.9" }, { "model": "acrobat", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.3" }, { "model": "acrobat", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.2" }, { "model": "acrobat", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.1" }, { "model": "acrobat", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0" }, { "model": "acrobat", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "6.0.5" }, { "model": "acrobat", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "6.0.4" }, { "model": "acrobat", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "6.0.3" }, { "model": "acrobat", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "6.0.2" }, { "model": "acrobat", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "6.0.1" }, { "model": "acrobat", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "6.0" }, { "model": "reader", "scope": "ne", "trust": 0.3, "vendor": "adobe", "version": "9.3.3" }, { "model": "acrobat standard", "scope": "ne", "trust": 0.3, "vendor": "adobe", "version": "9.3.3" }, { "model": "acrobat professional", "scope": "ne", "trust": 0.3, "vendor": "adobe", "version": "9.3.3" }, { "model": "acrobat", "scope": "ne", "trust": 0.3, "vendor": "adobe", "version": "9.3.3" } ], "sources": [ { "db": "BID", "id": "41232" }, { "db": "JVNDB", "id": "JVNDB-2010-001704" }, { "db": "CNNVD", "id": "CNNVD-201006-474" }, { "db": "NVD", "id": "CVE-2010-1285" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:9.1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:9.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:9.3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:9.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:9.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:9.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:9.3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:9.1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:9.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:9.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:8.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:8.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:8.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:8.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:8.1.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:8.1.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:8.1.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:8.1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:8.1.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:8.1.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:8.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:8.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:8.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:8.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:8.1.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:8.1.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:8.1.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:8.1.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:8.1.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:8.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2010-1285" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Nicolas Joly of VUPEN Vulnerability Research Team", "sources": [ { "db": "BID", "id": "41232" }, { "db": "CNNVD", "id": "CNNVD-201006-474" } ], "trust": 0.9 }, "cve": "CVE-2010-1285", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": true, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 9.3, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2010-1285", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "VHN-43890", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2010-1285", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201006-474", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-43890", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-43890" }, { "db": "JVNDB", "id": "JVNDB-2010-001704" }, { "db": "CNNVD", "id": "CNNVD-201006-474" }, { "db": "NVD", "id": "CVE-2010-1285" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow attackers to execute arbitrary code via unspecified manipulations involving the newclass (0x58) operator and an \"invalid pointer vulnerability\" that triggers memory corruption, a different vulnerability than CVE-2010-2168 and CVE-2010-2201. This vulnerability CVE-2010-2168 and CVE-2010-2201 Is a different vulnerability.An attacker could execute arbitrary code. Adobe Acrobat and Reader are prone to a remote code-execution vulnerability. \nAdobe Reader and Acrobat versions prior to and including 9.3.2 and 8.2.2 are affected. \nNOTE: This issue was previously covered in BID 41130 (Adobe Acrobat and Reader Prior to 9.3.3 Multiple Remote Vulnerabilities) but has been given its own record to better document it. They are used to create, view, search, digitally\nsign, verify, print, and collaborate on Adobe PDF files.\"\n\n\nII. \n\nThis vulnerability is caused by a memory corruption error when processing\nthe \"newclass\" operator (bytecode 0x58) while parsing Flash content within\na PDF document, which could be exploited by attackers to execute arbitrary\ncode by tricking a user into opening a malicious PDF file. Binary Analysis \u0026 Proof-of-concept\n---------------------------------------\n\nIn-depth binary analysis of the vulnerability and a code execution exploit\nare available through the VUPEN Binary Analysis \u0026 Exploits Service :\n\nhttp://www.vupen.com/english/services/ba-index.php\n\n\nV. \n\n\nVI. CREDIT\n--------------\n\nThis vulnerability was discovered by Nicolas Joly of VUPEN Security\n\n\nVII. ABOUT VUPEN Security\n---------------------------\n\nVUPEN is a leading IT security research company providing vulnerability\nmanagement and security intelligence solutions which enable enterprises\nand institutions to eliminate vulnerabilities before they can be exploited,\nensure security policy compliance and meaningfully measure and manage risks. \n\nGovernmental and federal agencies, and global enterprises in the financial\nservices, insurance, manufacturing and technology industries rely on VUPEN\nto improve their security, prioritize resources, cut time and costs, and\nstay ahead of the latest threats. \n\n* VUPEN Vulnerability Notification Service (VNS) :\nhttp://www.vupen.com/english/services/vns-index.php\n\n* VUPEN Binary Analysis \u0026 Exploits Service (BAE) :\nhttp://www.vupen.com/english/services/ba-index.php\n\n* VUPEN Threat Protection Program for Govs (TPP) :\nhttp://www.vupen.com/english/services/tpp-index.php\n\n* VUPEN Web Application Security Scanner (WASS) :\nhttp://www.vupen.com/english/services/wass-index.php\n\n\nVIII. REFERENCES\n----------------------\n\nhttp://www.vupen.com/english/advisories/2010/1636\nhttp://www.adobe.com/support/security/bulletins/apsb10-15.html\nhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1285\n\n\nIX. DISCLOSURE TIMELINE\n-----------------------------\n\n2009-09-06 - Vendor notified\n2009-09-06 - Vendor response\n2010-03-08 - Status update received\n2010-06-20 - Status update received\n2010-06-29 - Coordinated public Disclosure\n. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 201009-05\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n http://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n Title: Adobe Reader: Multiple vulnerabilities\n Date: September 07, 2010\n Bugs: #297385, #306429, #313343, #322857\n ID: 201009-05\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities in Adobe Reader might result in the execution\nof arbitrary code or other attacks. For further\ninformation please consult the CVE entries and the Adobe Security\nBulletins referenced below. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll Adobe Reader users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=app-text/acroread-9.3.4\"\n\nReferences\n==========\n\n [ 1 ] APSA10-01\n http://www.adobe.com/support/security/advisories/apsa10-01.html\n [ 2 ] APSB10-02\n http://www.adobe.com/support/security/bulletins/apsb10-02.html\n [ 3 ] APSB10-07\n http://www.adobe.com/support/security/bulletins/apsb10-07.html\n [ 4 ] APSB10-09\n http://www.adobe.com/support/security/bulletins/apsb10-09.html\n [ 5 ] APSB10-14\n http://www.adobe.com/support/security/bulletins/apsb10-14.html\n [ 6 ] APSB10-16\n http://www.adobe.com/support/security/bulletins/apsb10-16.html\n [ 7 ] CVE-2009-3953\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3953\n [ 8 ] CVE-2009-4324\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4324\n [ 9 ] CVE-2010-0186\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0186\n [ 10 ] CVE-2010-0188\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0188\n [ 11 ] CVE-2010-0190\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0190\n [ 12 ] CVE-2010-0191\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0191\n [ 13 ] CVE-2010-0192\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0192\n [ 14 ] CVE-2010-0193\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0193\n [ 15 ] CVE-2010-0194\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0194\n [ 16 ] CVE-2010-0195\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0195\n [ 17 ] CVE-2010-0196\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0196\n [ 18 ] CVE-2010-0197\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0197\n [ 19 ] CVE-2010-0198\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0198\n [ 20 ] CVE-2010-0199\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0199\n [ 21 ] CVE-2010-0201\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0201\n [ 22 ] CVE-2010-0202\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0202\n [ 23 ] CVE-2010-0203\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0203\n [ 24 ] CVE-2010-0204\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0204\n [ 25 ] CVE-2010-1241\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1241\n [ 26 ] CVE-2010-1285\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1285\n [ 27 ] CVE-2010-1295\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1295\n [ 28 ] CVE-2010-1297\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1297\n [ 29 ] CVE-2010-2168\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2168\n [ 30 ] CVE-2010-2201\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2201\n [ 31 ] CVE-2010-2202\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2202\n [ 32 ] CVE-2010-2203\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2203\n [ 33 ] CVE-2010-2204\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2204\n [ 34 ] CVE-2010-2205\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2205\n [ 35 ] CVE-2010-2206\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2206\n [ 36 ] CVE-2010-2207\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2207\n [ 37 ] CVE-2010-2208\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2208\n [ 38 ] CVE-2010-2209\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2209\n [ 39 ] CVE-2010-2210\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2210\n [ 40 ] CVE-2010-2211\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2211\n [ 41 ] CVE-2010-2212\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2212\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-201009-05.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2010 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n\n. ----------------------------------------------------------------------\n\n\nSecunia CSI integrated with Microsoft WSUS and Microsoft SCCM for 3rd party Patch Management\n\nFree webinars\n\nhttp://secunia.com/vulnerability_scanning/corporate/webinars/\n\n\n----------------------------------------------------------------------\n\nTITLE:\nAdobe Flash Player Unspecified Code Execution Vulnerability\n\nSECUNIA ADVISORY ID:\nSA40026\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/40026/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=40026\n\nRELEASE DATE:\n2010-06-05\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/40026/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/40026/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=40026\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nA vulnerability has been reported in Adobe Flash Player, which can be\nexploited by malicious people to compromise a user\u0027s system. \n\nThe vulnerability is caused due to an unspecified error. No more\ninformation is currently available. \n\nThe vulnerability is reported in version 10.0.45.2 and prior 10.0.x\nand 9.0.x versions for Windows, Macintosh, Linux, and Solaris. \n\nNOTE: The vulnerability is reportedly being actively exploited. \n\nSOLUTION:\nReportedly, the latest version 10.1 Release Candidate is not\naffected. \n\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nPROVIDED AND/OR DISCOVERED BY:\nReported as a 0-day. \n\nORIGINAL ADVISORY:\nAdobe:\nhttp://www.adobe.com/support/security/advisories/apsa10-01.html\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n. \n-----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n\n National Cyber Alert System\n\n Technical Cyber Security Alert TA10-159A\n\n\nAdobe Flash, Reader, and Acrobat Vulnerability\n\n Original release date: June 08, 2010\n Last revised: --\n Source: US-CERT\n\n\nSystems Affected\n\n * Adobe Flash Player 10.0.45.2 and earlier 10.x versions\n * Adobe Flash Player 9.0.262 and earlier 9.x versions\n * Adobe Reader 9.3.2 and earlier 9.x versions\n * Adobe Acrobat 9.3.2 and earlier 9.x versions\n\n Other Adobe products that support Flash may also be vulnerable. This\n vulnerability affects Flash Player, Reader, Acrobat, and possibly\n other products that support Flash. \n\n\nI. It may\n also affect other products that independently support Flash, such\n as Photoshop, Photoshop Lightroom, Freehand MX, and Fireworks. \n\n An attacker could exploit this vulnerability by convincing a user\n to open specially crafted Flash content. Flash content is commonly\n hosted on a web page, but it can also be embedded in PDF and other\n documents or provided as a stand-alone file. \n\n\nII. \n\n\nIII. Solution\n\n Update\n\n Adobe Security Advisory APSA10-01 suggests updating to the release\n candidate of Flash Player 10.1. \n\n Disable Flash in your web browser\n\n Uninstall Flash or restrict which sites are allowed to run Flash. \n To the extent possible, only run trusted Flash content on trusted\n domains. For more information, see Securing Your Web Browser. \n\n Disable Flash in Adobe Reader and Acrobat\n\n Disabling Flash in Adobe Reader will mitigate attacks that rely on\n Flash content embedded in a PDF file. Disabling 3D \u0026 Multimedia\n support does not directly address the vulnerability, but it does\n provide additional mitigation and results in a more user-friendly\n error message instead of a crash. To disable Flash and 3D \u0026\n Multimedia support in Adobe Reader 9, delete, rename, or remove\n access to these files:\n\n Microsoft Windows\n\n \"%ProgramFiles%\\Adobe\\Reader 9.0\\Reader\\authplay.dll\"\n \"%ProgramFiles%\\Adobe\\Reader 9.0\\Reader\\rt3d.dll\"\n\n Apple Mac OS X\n\n \"/Applications/Adobe Reader 9/Adobe\n Reader.app/Contents/Frameworks/AuthPlayLib.bundle\"\n \"/Applications/Adobe Reader 9/Adobe\n Reader.app/Contents/Frameworks/Adobe3D.framework\"\n\n\n GNU/Linux (locations may vary among distributions)\n\n \"/opt/Adobe/Reader9/Reader/intellinux/lib/libauthplay.so\"\n \"/opt/Adobe/Reader9/Reader/intellinux/lib/librt3d.so\"\n\n File locations may be different for Adobe Acrobat or other Adobe\n products that include Flash and 3D \u0026 Multimedia support. Disabling\n these plugins will reduce functionality and will not protect\n against Flash content hosted on websites. Depending on the update\n schedule for products other than Flash Player, consider leaving\n Flash and 3D \u0026 Multimedia support disabled unless they are\n absolutely required. \n\n Prevent Internet Explorer from automatically opening PDF documents\n\n The installer for Adobe Reader and Acrobat configures Internet\n Explorer to automatically open PDF files without any user\n interaction. This behavior can be reverted to a safer option that\n prompts the user by importing the following as a .REG file:\n\n Windows Registry Editor Version 5.00\n\n [HKEY_CLASSES_ROOT\\AcroExch.Document.7]\n \"EditFlags\"=hex:00,00,00,00\n\n Disable the display of PDF documents in the web browser\n\n Preventing PDF documents from opening inside a web browser will\n partially mitigate this vulnerability. If this workaround is\n applied, it may also mitigate future vulnerabilities. \n\n To prevent PDF documents from automatically being opened in a web\n browser, do the following:\n\n 1. \n 2. Open the Edit menu. \n 3. Choose the Preferences option. \n 4. Choose the Internet section. \n 5. Uncheck the \"Display PDF in browser\" checkbox. \n\n Disable JavaScript in Adobe Reader and Acrobat\n\n Disabling JavaScript provides some additional protection against\n attacks. Acrobat JavaScript can be disabled using the Preferences\n menu (Edit -\u003e Preferences -\u003e JavaScript; uncheck Enable Acrobat\n JavaScript). \n\n Enable DEP in Microsoft Windows\n\n Consider enabling Data Execution Prevention (DEP) in supported\n versions of Windows. DEP should not be treated as a complete\n workaround, but it can mitigate the execution of attacker-supplied\n code in some cases. Microsoft has published detailed technical\n information about DEP in Security Research \u0026 Defense blog posts\n \"Understanding DEP as a mitigation technology\" part 1 and part 2. \n Use of DEP should be considered in conjunction with the application\n of patches or other mitigations described in this document. \n\n Do not access PDF documents from untrusted sources\n\n Do not open unfamiliar or unexpected PDF documents, particularly\n those hosted on websites or delivered as email attachments. Please\n see Cyber Security Tip ST04-010. \n\n\nIV. References\n\n * Security Advisory for Flash Player, Adobe Reader and Acrobat -\n \u003chttp://www.adobe.com/support/security/advisories/apsa10-01.html\u003e\n\n * Adobe Labs - Flash Player 10 pre-release -\n \u003chttp://labs.adobe.com/technologies/flashplayer10/\u003e\n\n * US-CERT Vulnerability Note VU#486225 -\n \u003chttp://www.kb.cert.org/vuls/id/486225\u003e\n\n * Securing Your Web Browser -\n \u003chttp://www.us-cert.gov/reading_room/securing_browser/\u003e\n\n * Understanding DEP as a mitigation technology part 1 -\n \u003chttp://blogs.technet.com/b/srd/archive/2009/06/05/understanding-dep-as-a-mitigation-technology-part-1.aspx\u003e\n\n * Understanding DEP as a mitigation technology part 2 -\n \u003chttp://blogs.technet.com/b/srd/archive/2009/06/12/understanding-dep-as-a-mitigation-technology-part-2.aspx\u003e\n\n ____________________________________________________________________\n\n The most recent version of this document can be found at:\n\n \u003chttp://www.us-cert.gov/cas/techalerts/TA10-159A.html\u003e\n ____________________________________________________________________\n\n Feedback can be directed to US-CERT Technical Staff. Please send\n email to \u003ccert@cert.org\u003e with \"TA10-159A Feedback VU#486225\" in\n the subject. \n ____________________________________________________________________\n\n For instructions on subscribing to or unsubscribing from this\n mailing list, visit \u003chttp://www.us-cert.gov/cas/signup.html\u003e. \n ____________________________________________________________________\n\n Produced 2010 by US-CERT, a government organization. \n\n Terms of use:\n\n \u003chttp://www.us-cert.gov/legal.html\u003e\n ____________________________________________________________________\n\nRevision History\n\n June 08, 2010: Initial release\n\n\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.5 (GNU/Linux)\n\niQEVAwUBTA65yT6pPKYJORa3AQLS9wf/fh+7IwRtBvoPgn8pYeOsVheLkbVLWC3W\nmiWUnY1acuPTwZzG5JcAldRHksFkx1j0mMEvp4PhtiTr51JFPi4XgDfrG4cEcVaw\nnuAqEV+hLAWZkMex/jWxBV+85tZqKN0kiUr3bq5DPsdkhjV7c2MFfS8BSxLXLuPm\nOFAXPT+XFldq6MJhYUOtWT1CIz6PNPfo68KmZaUThjdqkkBW3HQu90OSRf2c6M/u\nV6KBQf7QuhpPqYUqAZU6ZUNEfL/7g2BwvuPjUMlgE5N+Z8EYnhyhu0qDtZeLUcXA\n2gH31VEr79DUHJqpb9jk61bi5Dm4gjHeLHoTAwu0IrduZzXvWncfIg==\n=ZPZM\n-----END PGP SIGNATURE-----\n", "sources": [ { "db": "NVD", "id": "CVE-2010-1285" }, { "db": "JVNDB", "id": "JVNDB-2010-001704" }, { "db": "BID", "id": "41232" }, { "db": "VULHUB", "id": "VHN-43890" }, { "db": "PACKETSTORM", "id": "91354" }, { "db": "PACKETSTORM", "id": "93607" }, { "db": "PACKETSTORM", "id": "90322" }, { "db": "PACKETSTORM", "id": "90516" } ], "trust": 2.34 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-43890", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-43890" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2010-1285", "trust": 3.0 }, { "db": "BID", "id": "41232", "trust": 2.2 }, { "db": "VUPEN", "id": "ADV-2010-1636", "trust": 2.0 }, { "db": "SECTRACK", "id": "1024159", "trust": 1.1 }, { "db": "USCERT", "id": "TA10-159A", "trust": 0.9 }, { "db": "USCERT", "id": "SA10-162A", "trust": 0.8 }, { "db": "USCERT", "id": "TA10-162A", "trust": 0.8 }, { "db": "USCERT", "id": "SA10-159A", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2010-001704", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201006-474", "trust": 0.7 }, { "db": "PACKETSTORM", "id": "91354", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-43890", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "93607", "trust": 0.1 }, { "db": "SECUNIA", "id": "40026", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "90322", "trust": 0.1 }, { "db": "CERT/CC", "id": "VU#486225", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "90516", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-43890" }, { "db": "BID", "id": "41232" }, { "db": "JVNDB", "id": "JVNDB-2010-001704" }, { "db": "PACKETSTORM", "id": "91354" }, { "db": "PACKETSTORM", "id": "93607" }, { "db": "PACKETSTORM", "id": "90322" }, { "db": "PACKETSTORM", "id": "90516" }, { "db": "CNNVD", "id": "CNNVD-201006-474" }, { "db": "NVD", "id": "CVE-2010-1285" } ] }, "id": "VAR-201006-1200", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-43890" } ], "trust": 0.01 }, "last_update_date": "2024-04-19T19:23:56.455000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "APSB10-15", "trust": 0.8, "url": "http://www.adobe.com/support/security/bulletins/apsb10-15.html" }, { "title": "APSB10-15", "trust": 0.8, "url": "http://www.adobe.com/jp/support/security/bulletins/apsb10-15.html" }, { "title": "RHSA-2010:0503", "trust": 0.8, "url": "https://rhn.redhat.com/errata/rhsa-2010-0503.html" }, { "title": "TA10-159A", "trust": 0.8, "url": "http://software.fujitsu.com/jp/security/vulnerabilities/ta10-159a.html" }, { "title": "TA10-162A", "trust": 0.8, "url": "http://software.fujitsu.com/jp/security/vulnerabilities/ta10-162a.html" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2010-001704" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.9 }, { "problemtype": "CWE-399", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-43890" }, { "db": "JVNDB", "id": "JVNDB-2010-001704" }, { "db": "NVD", "id": "CVE-2010-1285" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.1, "url": "http://www.adobe.com/support/security/bulletins/apsb10-15.html" }, { "trust": 2.0, "url": "http://www.vupen.com/english/advisories/2010/1636" }, { "trust": 1.9, "url": "http://www.securityfocus.com/bid/41232" }, { "trust": 1.1, "url": "http://www.securityfocus.com/archive/1/512099" }, { "trust": 1.1, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a6725" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id?1024159" }, { "trust": 1.0, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-1285" }, { "trust": 0.8, "url": "http://www.ipa.go.jp/security/ciadr/vul/20100611-adobe.html" }, { "trust": 0.8, "url": "https://www.jpcert.or.jp/at/2010/at100015.txt" }, { "trust": 0.8, "url": "https://www.jpcert.or.jp/at/2010/at100017.txt" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnta10-159a/index.html" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnta10-162a/index.html" }, { "trust": 0.8, "url": "http://jvn.jp/tr/jvntr-2010-16" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-1285" }, { "trust": 0.8, "url": "http://www.us-cert.gov/cas/alerts/sa10-159a.html" }, { "trust": 0.8, "url": "http://www.us-cert.gov/cas/alerts/sa10-162a.html" }, { "trust": 0.8, "url": "http://www.us-cert.gov/cas/techalerts/ta10-159a.html" }, { "trust": 0.8, "url": "http://www.us-cert.gov/cas/techalerts/ta10-162a.html" }, { "trust": 0.8, "url": "http://www.npa.go.jp/cyberpolice/#topics" }, { "trust": 0.3, "url": "http://www.adobe.com" }, { "trust": 0.3, "url": "/archive/1/512099" }, { "trust": 0.2, "url": "http://www.adobe.com/support/security/advisories/apsa10-01.html" }, { "trust": 0.1, "url": "http://www.vupen.com/english/services/wass-index.php" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-1285" }, { "trust": 0.1, "url": "http://www.vupen.com/english/research.php" }, { "trust": 0.1, "url": "http://www.vupen.com/english/services/ba-index.php" }, { "trust": 0.1, "url": "http://www.vupen.com/english/services/tpp-index.php" }, { "trust": 0.1, "url": "http://www.vupen.com/english/services/vns-index.php" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2203" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-4324" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2209" }, { "trust": 0.1, "url": "https://bugs.gentoo.org." }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-0188" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-0194" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-0202" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0194" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-0199" }, { "trust": 0.1, "url": "http://security.gentoo.org/glsa/glsa-201009-05.xml" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2202" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2205" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2206" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-0203" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0197" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2211" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2204" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0199" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-0192" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0186" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0190" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-0196" }, { "trust": 0.1, "url": "http://www.adobe.com/support/security/bulletins/apsb10-14.html" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-3953" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-4324" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0191" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0202" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0204" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-0201" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2210" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-0197" }, { "trust": 0.1, "url": "http://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0188" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0198" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-0191" }, { "trust": 0.1, "url": "http://www.adobe.com/support/security/bulletins/apsb10-07.html" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-1297" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-1241" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-1295" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0192" }, { "trust": 0.1, "url": "http://security.gentoo.org/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-3953" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0203" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2208" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-0190" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0193" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-0198" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2207" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0195" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-0204" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2168" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0201" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0196" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2201" }, { "trust": 0.1, "url": "http://www.adobe.com/support/security/bulletins/apsb10-09.html" }, { "trust": 0.1, "url": "http://www.adobe.com/support/security/bulletins/apsb10-02.html" }, { "trust": 0.1, "url": "http://www.adobe.com/support/security/bulletins/apsb10-16.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-0193" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-0186" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-0195" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2212" }, { "trust": 0.1, "url": "http://secunia.com/products/corporate/evm/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/40026/#comments" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_scanning/corporate/webinars/" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_scanning/personal/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=40026" }, { "trust": 0.1, "url": "http://secunia.com/advisories/40026/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/about_secunia_advisories/" }, { "trust": 0.1, "url": "http://www.adobe.com/support/security/advisories/apsa10-01.html\u003e" }, { "trust": 0.1, "url": "http://www.kb.cert.org/vuls/id/486225\u003e" }, { "trust": 0.1, "url": "http://www.us-cert.gov/cas/techalerts/ta10-159a.html\u003e" }, { "trust": 0.1, "url": "http://www.us-cert.gov/legal.html\u003e" }, { "trust": 0.1, "url": "http://blogs.technet.com/b/srd/archive/2009/06/12/understanding-dep-as-a-mitigation-technology-part-2.aspx\u003e" }, { "trust": 0.1, "url": "http://labs.adobe.com/technologies/flashplayer10/\u003e" }, { "trust": 0.1, "url": "http://www.us-cert.gov/reading_room/securing_browser/\u003e" }, { "trust": 0.1, "url": "http://www.us-cert.gov/cas/signup.html\u003e." }, { "trust": 0.1, "url": "http://blogs.technet.com/b/srd/archive/2009/06/05/understanding-dep-as-a-mitigation-technology-part-1.aspx\u003e" } ], "sources": [ { "db": "VULHUB", "id": "VHN-43890" }, { "db": "BID", "id": "41232" }, { "db": "JVNDB", "id": "JVNDB-2010-001704" }, { "db": "PACKETSTORM", "id": "91354" }, { "db": "PACKETSTORM", "id": "93607" }, { "db": "PACKETSTORM", "id": "90322" }, { "db": "PACKETSTORM", "id": "90516" }, { "db": "CNNVD", "id": "CNNVD-201006-474" }, { "db": "NVD", "id": "CVE-2010-1285" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-43890" }, { "db": "BID", "id": "41232" }, { "db": "JVNDB", "id": "JVNDB-2010-001704" }, { "db": "PACKETSTORM", "id": "91354" }, { "db": "PACKETSTORM", "id": "93607" }, { "db": "PACKETSTORM", "id": "90322" }, { "db": "PACKETSTORM", "id": "90516" }, { "db": "CNNVD", "id": "CNNVD-201006-474" }, { "db": "NVD", "id": "CVE-2010-1285" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2010-06-30T00:00:00", "db": "VULHUB", "id": "VHN-43890" }, { "date": "2010-06-29T00:00:00", "db": "BID", "id": "41232" }, { "date": "2010-07-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2010-001704" }, { "date": "2010-07-01T05:42:52", "db": "PACKETSTORM", "id": "91354" }, { "date": "2010-09-08T05:23:46", "db": "PACKETSTORM", "id": "93607" }, { "date": "2010-06-07T11:14:28", "db": "PACKETSTORM", "id": "90322" }, { "date": "2010-06-12T04:47:27", "db": "PACKETSTORM", "id": "90516" }, { "date": "2010-06-29T00:00:00", "db": "CNNVD", "id": "CNNVD-201006-474" }, { "date": "2010-06-30T18:30:01.380000", "db": "NVD", "id": "CVE-2010-1285" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-10-30T00:00:00", "db": "VULHUB", "id": "VHN-43890" }, { "date": "2015-03-19T08:35:00", "db": "BID", "id": "41232" }, { "date": "2010-07-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2010-001704" }, { "date": "2011-07-12T00:00:00", "db": "CNNVD", "id": "CNNVD-201006-474" }, { "date": "2018-10-30T16:25:16.967000", "db": "NVD", "id": "CVE-2010-1285" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "90516" }, { "db": "CNNVD", "id": "CNNVD-201006-474" } ], "trust": 0.7 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Adobe Reader and Acrobat Vulnerable to arbitrary code execution", "sources": [ { "db": "JVNDB", "id": "JVNDB-2010-001704" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201006-474" } ], "trust": 0.6 } }
rhsa-2010_0503
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated acroread packages that fix multiple security issues are now\navailable for Red Hat Enterprise Linux 4 Extras and Red Hat Enterprise\nLinux 5 Supplementary.\n\nThe Red Hat Security Response Team has rated this update as having critical\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "Adobe Reader allows users to view and print documents in Portable Document\nFormat (PDF).\n\nThis update fixes multiple vulnerabilities in Adobe Reader. These\nvulnerabilities are detailed on the Adobe security pages APSA10-01 and\nAPSB10-15, listed in the References section. A specially-crafted PDF file\ncould cause Adobe Reader to crash or, potentially, execute arbitrary code\nas the user running Adobe Reader when opened. (CVE-2010-1240,\nCVE-2010-1285, CVE-2010-1295, CVE-2010-1297, CVE-2010-2168, CVE-2010-2201,\nCVE-2010-2202, CVE-2010-2203, CVE-2010-2204, CVE-2010-2205, CVE-2010-2206,\nCVE-2010-2207, CVE-2010-2208, CVE-2010-2209, CVE-2010-2210, CVE-2010-2211,\nCVE-2010-2212)\n\nAll Adobe Reader users should install these updated packages. They contain\nAdobe Reader version 9.3.3, which is not vulnerable to these issues. All\nrunning instances of Adobe Reader must be restarted for the update to take\neffect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2010:0503", "url": "https://access.redhat.com/errata/RHSA-2010:0503" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "http://www.adobe.com/support/security/advisories/apsa10-01.html", "url": "http://www.adobe.com/support/security/advisories/apsa10-01.html" }, { "category": "external", "summary": "http://www.adobe.com/support/security/bulletins/apsb10-15.html", "url": "http://www.adobe.com/support/security/bulletins/apsb10-15.html" }, { "category": "external", "summary": "600692", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=600692" }, { "category": "external", "summary": "609203", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=609203" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0503.json" } ], "title": "Red Hat Security Advisory: acroread security update", "tracking": { "current_release_date": "2024-11-14T10:49:37+00:00", "generator": { "date": "2024-11-14T10:49:37+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2010:0503", "initial_release_date": "2010-06-30T17:47:00+00:00", "revision_history": [ { "date": "2010-06-30T17:47:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2010-06-30T13:47:42+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T10:49:37+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4 Extras", "product": { "name": "Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Desktop version 4 Extras", "product": { "name": "Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4 Extras", "product": { "name": "Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4 Extras", "product": { "name": "Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product": { "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Supplementary (v. 5)", "product": { "name": "Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux Supplementary" }, { "branches": [ { "category": "product_version", "name": "acroread-0:9.3.3-2.el4.i386", "product": { "name": "acroread-0:9.3.3-2.el4.i386", "product_id": "acroread-0:9.3.3-2.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/acroread@9.3.3-2.el4?arch=i386" } } }, { "category": "product_version", "name": "acroread-plugin-0:9.3.3-2.el4.i386", "product": { "name": "acroread-plugin-0:9.3.3-2.el4.i386", "product_id": "acroread-plugin-0:9.3.3-2.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/acroread-plugin@9.3.3-2.el4?arch=i386" } } }, { "category": "product_version", "name": "acroread-0:9.3.3-1.el5.i386", "product": { "name": "acroread-0:9.3.3-1.el5.i386", "product_id": "acroread-0:9.3.3-1.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/acroread@9.3.3-1.el5?arch=i386" } } }, { "category": "product_version", "name": "acroread-plugin-0:9.3.3-1.el5.i386", "product": { "name": "acroread-plugin-0:9.3.3-1.el5.i386", "product_id": "acroread-plugin-0:9.3.3-1.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/acroread-plugin@9.3.3-1.el5?arch=i386" } } } ], "category": "architecture", "name": "i386" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "acroread-0:9.3.3-2.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:acroread-0:9.3.3-2.el4.i386" }, "product_reference": "acroread-0:9.3.3-2.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-plugin-0:9.3.3-2.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:acroread-plugin-0:9.3.3-2.el4.i386" }, "product_reference": "acroread-plugin-0:9.3.3-2.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-0:9.3.3-2.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:acroread-0:9.3.3-2.el4.i386" }, "product_reference": "acroread-0:9.3.3-2.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-plugin-0:9.3.3-2.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:acroread-plugin-0:9.3.3-2.el4.i386" }, "product_reference": "acroread-plugin-0:9.3.3-2.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-0:9.3.3-2.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:acroread-0:9.3.3-2.el4.i386" }, "product_reference": "acroread-0:9.3.3-2.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-plugin-0:9.3.3-2.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:acroread-plugin-0:9.3.3-2.el4.i386" }, "product_reference": "acroread-plugin-0:9.3.3-2.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-0:9.3.3-2.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:acroread-0:9.3.3-2.el4.i386" }, "product_reference": "acroread-0:9.3.3-2.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-plugin-0:9.3.3-2.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:acroread-plugin-0:9.3.3-2.el4.i386" }, "product_reference": "acroread-plugin-0:9.3.3-2.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-0:9.3.3-1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:acroread-0:9.3.3-1.el5.i386" }, "product_reference": "acroread-0:9.3.3-1.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-plugin-0:9.3.3-1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386" }, "product_reference": "acroread-plugin-0:9.3.3-1.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-0:9.3.3-1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:acroread-0:9.3.3-1.el5.i386" }, "product_reference": "acroread-0:9.3.3-1.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-plugin-0:9.3.3-1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386" }, "product_reference": "acroread-plugin-0:9.3.3-1.el5.i386", "relates_to_product_reference": "5Server-Supplementary" } ] }, "vulnerabilities": [ { "cve": "CVE-2010-1240", "discovery_date": "2010-06-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "609203" } ], "notes": [ { "category": "description", "text": "Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, do not restrict the contents of one text field in the Launch File warning dialog, which makes it easier for remote attackers to trick users into executing an arbitrary local program that was specified in a PDF document, as demonstrated by a text field that claims that the Open button will enable the user to read an encrypted message.", "title": "Vulnerability description" }, { "category": "summary", "text": "acroread: multiple code execution flaws (APSB10-15)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:acroread-0:9.3.3-2.el4.i386", "4AS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "5Client-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-1240" }, { "category": "external", "summary": "RHBZ#609203", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=609203" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-1240", "url": "https://www.cve.org/CVERecord?id=CVE-2010-1240" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-1240", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1240" } ], "release_date": "2010-06-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-06-30T17:47:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:acroread-0:9.3.3-2.el4.i386", "4AS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "5Client-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0503" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:acroread-0:9.3.3-2.el4.i386", "4AS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "5Client-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "acroread: multiple code execution flaws (APSB10-15)" }, { "cve": "CVE-2010-1285", "discovery_date": "2010-06-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "609203" } ], "notes": [ { "category": "description", "text": "Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow attackers to execute arbitrary code via unspecified manipulations involving the newclass (0x58) operator and an \"invalid pointer vulnerability\" that triggers memory corruption, a different vulnerability than CVE-2010-2168 and CVE-2010-2201.", "title": "Vulnerability description" }, { "category": "summary", "text": "acroread: multiple code execution flaws (APSB10-15)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:acroread-0:9.3.3-2.el4.i386", "4AS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "5Client-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-1285" }, { "category": "external", "summary": "RHBZ#609203", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=609203" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-1285", "url": "https://www.cve.org/CVERecord?id=CVE-2010-1285" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-1285", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1285" } ], "release_date": "2010-06-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-06-30T17:47:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:acroread-0:9.3.3-2.el4.i386", "4AS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "5Client-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0503" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:acroread-0:9.3.3-2.el4.i386", "4AS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "5Client-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "acroread: multiple code execution flaws (APSB10-15)" }, { "cve": "CVE-2010-1295", "discovery_date": "2010-06-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "609203" } ], "notes": [ { "category": "description", "text": "Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2202, CVE-2010-2207, CVE-2010-2209, CVE-2010-2210, CVE-2010-2211, and CVE-2010-2212.", "title": "Vulnerability description" }, { "category": "summary", "text": "acroread: multiple code execution flaws (APSB10-15)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:acroread-0:9.3.3-2.el4.i386", "4AS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "5Client-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-1295" }, { "category": "external", "summary": "RHBZ#609203", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=609203" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-1295", "url": "https://www.cve.org/CVERecord?id=CVE-2010-1295" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-1295", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1295" } ], "release_date": "2010-06-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-06-30T17:47:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:acroread-0:9.3.3-2.el4.i386", "4AS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "5Client-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0503" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:acroread-0:9.3.3-2.el4.i386", "4AS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "5Client-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "acroread: multiple code execution flaws (APSB10-15)" }, { "cve": "CVE-2010-1297", "discovery_date": "2010-06-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "600692" } ], "notes": [ { "category": "description", "text": "Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64; Adobe AIR before 2.0.2.12610; and Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted SWF content, related to authplay.dll and the ActionScript Virtual Machine 2 (AVM2) newfunction instruction, as exploited in the wild in June 2010.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: Arbitrary code execution by opening a specially-crafted PDF file with malicious SWF content (APSA10-01)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:acroread-0:9.3.3-2.el4.i386", "4AS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "5Client-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-1297" }, { "category": "external", "summary": "RHBZ#600692", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=600692" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-1297", "url": "https://www.cve.org/CVERecord?id=CVE-2010-1297" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-1297", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1297" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2010-06-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-06-30T17:47:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:acroread-0:9.3.3-2.el4.i386", "4AS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "5Client-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0503" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:acroread-0:9.3.3-2.el4.i386", "4AS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "5Client-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-06-08T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: Arbitrary code execution by opening a specially-crafted PDF file with malicious SWF content (APSA10-01)" }, { "cve": "CVE-2010-2168", "discovery_date": "2010-06-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "609203" } ], "notes": [ { "category": "description", "text": "Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow attackers to execute arbitrary code via a PDF file with crafted Flash content, involving the newfunction (0x44) operator and an \"invalid pointer vulnerability\" that triggers memory corruption, a different vulnerability than CVE-2010-1285 and CVE-2010-2201.", "title": "Vulnerability description" }, { "category": "summary", "text": "acroread: multiple code execution flaws (APSB10-15)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:acroread-0:9.3.3-2.el4.i386", "4AS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "5Client-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-2168" }, { "category": "external", "summary": "RHBZ#609203", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=609203" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-2168", "url": "https://www.cve.org/CVERecord?id=CVE-2010-2168" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-2168", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2168" } ], "release_date": "2010-06-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-06-30T17:47:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:acroread-0:9.3.3-2.el4.i386", "4AS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "5Client-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0503" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:acroread-0:9.3.3-2.el4.i386", "4AS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "5Client-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "acroread: multiple code execution flaws (APSB10-15)" }, { "cve": "CVE-2010-2201", "discovery_date": "2010-06-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "609203" } ], "notes": [ { "category": "description", "text": "Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow attackers to execute arbitrary code via a PDF file with crafted Flash content involving the (1) pushstring (0x2C) operator, (2) debugfile (0xF1) operator, and an \"invalid pointer vulnerability\" that triggers memory corruption, a different vulnerability than CVE-2010-1285 and CVE-2010-2168.", "title": "Vulnerability description" }, { "category": "summary", "text": "acroread: multiple code execution flaws (APSB10-15)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:acroread-0:9.3.3-2.el4.i386", "4AS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "5Client-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-2201" }, { "category": "external", "summary": "RHBZ#609203", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=609203" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-2201", "url": "https://www.cve.org/CVERecord?id=CVE-2010-2201" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-2201", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2201" } ], "release_date": "2010-06-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-06-30T17:47:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:acroread-0:9.3.3-2.el4.i386", "4AS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "5Client-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0503" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:acroread-0:9.3.3-2.el4.i386", "4AS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "5Client-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "acroread: multiple code execution flaws (APSB10-15)" }, { "cve": "CVE-2010-2202", "discovery_date": "2010-06-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "609203" } ], "notes": [ { "category": "description", "text": "Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-1295, CVE-2010-2207, CVE-2010-2209, CVE-2010-2210, CVE-2010-2211, and CVE-2010-2212.", "title": "Vulnerability description" }, { "category": "summary", "text": "acroread: multiple code execution flaws (APSB10-15)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:acroread-0:9.3.3-2.el4.i386", "4AS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "5Client-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-2202" }, { "category": "external", "summary": "RHBZ#609203", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=609203" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-2202", "url": "https://www.cve.org/CVERecord?id=CVE-2010-2202" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-2202", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2202" } ], "release_date": "2010-06-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-06-30T17:47:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:acroread-0:9.3.3-2.el4.i386", "4AS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "5Client-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0503" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:acroread-0:9.3.3-2.el4.i386", "4AS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "5Client-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "acroread: multiple code execution flaws (APSB10-15)" }, { "cve": "CVE-2010-2203", "discovery_date": "2010-06-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "609203" } ], "notes": [ { "category": "description", "text": "Adobe Reader and Acrobat 9.x before 9.3.3 on UNIX allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "acroread: multiple code execution flaws (APSB10-15)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:acroread-0:9.3.3-2.el4.i386", "4AS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "5Client-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-2203" }, { "category": "external", "summary": "RHBZ#609203", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=609203" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-2203", "url": "https://www.cve.org/CVERecord?id=CVE-2010-2203" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-2203", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2203" } ], "release_date": "2010-06-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-06-30T17:47:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:acroread-0:9.3.3-2.el4.i386", "4AS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "5Client-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0503" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:acroread-0:9.3.3-2.el4.i386", "4AS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "5Client-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "acroread: multiple code execution flaws (APSB10-15)" }, { "cve": "CVE-2010-2204", "discovery_date": "2010-06-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "609203" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allows attackers to cause a denial of service or possibly execute arbitrary code via unknown vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "acroread: multiple code execution flaws (APSB10-15)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:acroread-0:9.3.3-2.el4.i386", "4AS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "5Client-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-2204" }, { "category": "external", "summary": "RHBZ#609203", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=609203" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-2204", "url": "https://www.cve.org/CVERecord?id=CVE-2010-2204" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-2204", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2204" } ], "release_date": "2010-06-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-06-30T17:47:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:acroread-0:9.3.3-2.el4.i386", "4AS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "5Client-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0503" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:acroread-0:9.3.3-2.el4.i386", "4AS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "5Client-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "acroread: multiple code execution flaws (APSB10-15)" }, { "cve": "CVE-2010-2205", "discovery_date": "2010-06-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "609203" } ], "notes": [ { "category": "description", "text": "Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, access uninitialized memory, which allows attackers to execute arbitrary code via unspecified vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "acroread: multiple code execution flaws (APSB10-15)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:acroread-0:9.3.3-2.el4.i386", "4AS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "5Client-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-2205" }, { "category": "external", "summary": "RHBZ#609203", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=609203" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-2205", "url": "https://www.cve.org/CVERecord?id=CVE-2010-2205" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-2205", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2205" } ], "release_date": "2010-06-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-06-30T17:47:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:acroread-0:9.3.3-2.el4.i386", "4AS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "5Client-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0503" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:acroread-0:9.3.3-2.el4.i386", "4AS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "5Client-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "acroread: multiple code execution flaws (APSB10-15)" }, { "cve": "CVE-2010-2206", "discovery_date": "2010-06-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "609203" } ], "notes": [ { "category": "description", "text": "Array index error in AcroForm.api in Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allows remote attackers to execute arbitrary code via a crafted GIF image in a PDF file, which bypasses a size check and triggers a heap-based buffer overflow.", "title": "Vulnerability description" }, { "category": "summary", "text": "acroread: multiple code execution flaws (APSB10-15)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:acroread-0:9.3.3-2.el4.i386", "4AS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "5Client-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-2206" }, { "category": "external", "summary": "RHBZ#609203", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=609203" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-2206", "url": "https://www.cve.org/CVERecord?id=CVE-2010-2206" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-2206", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2206" } ], "release_date": "2010-06-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-06-30T17:47:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:acroread-0:9.3.3-2.el4.i386", "4AS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "5Client-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0503" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:acroread-0:9.3.3-2.el4.i386", "4AS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "5Client-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "acroread: multiple code execution flaws (APSB10-15)" }, { "cve": "CVE-2010-2207", "discovery_date": "2010-06-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "609203" } ], "notes": [ { "category": "description", "text": "Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-1295, CVE-2010-2202, CVE-2010-2209, CVE-2010-2210, CVE-2010-2211, and CVE-2010-2212.", "title": "Vulnerability description" }, { "category": "summary", "text": "acroread: multiple code execution flaws (APSB10-15)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:acroread-0:9.3.3-2.el4.i386", "4AS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "5Client-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-2207" }, { "category": "external", "summary": "RHBZ#609203", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=609203" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-2207", "url": "https://www.cve.org/CVERecord?id=CVE-2010-2207" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-2207", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2207" } ], "release_date": "2010-06-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-06-30T17:47:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:acroread-0:9.3.3-2.el4.i386", "4AS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "5Client-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0503" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:acroread-0:9.3.3-2.el4.i386", "4AS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "5Client-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "acroread: multiple code execution flaws (APSB10-15)" }, { "cve": "CVE-2010-2208", "discovery_date": "2010-06-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "609203" } ], "notes": [ { "category": "description", "text": "Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, dereference a heap object after this object\u0027s deletion, which allows attackers to execute arbitrary code via unspecified vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "acroread: multiple code execution flaws (APSB10-15)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:acroread-0:9.3.3-2.el4.i386", "4AS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "5Client-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-2208" }, { "category": "external", "summary": "RHBZ#609203", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=609203" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-2208", "url": "https://www.cve.org/CVERecord?id=CVE-2010-2208" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-2208", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2208" } ], "release_date": "2010-06-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-06-30T17:47:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:acroread-0:9.3.3-2.el4.i386", "4AS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "5Client-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0503" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:acroread-0:9.3.3-2.el4.i386", "4AS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "5Client-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "acroread: multiple code execution flaws (APSB10-15)" }, { "cve": "CVE-2010-2209", "discovery_date": "2010-06-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "609203" } ], "notes": [ { "category": "description", "text": "Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-1295, CVE-2010-2202, CVE-2010-2207, CVE-2010-2210, CVE-2010-2211, and CVE-2010-2212.", "title": "Vulnerability description" }, { "category": "summary", "text": "acroread: multiple code execution flaws (APSB10-15)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:acroread-0:9.3.3-2.el4.i386", "4AS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "5Client-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-2209" }, { "category": "external", "summary": "RHBZ#609203", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=609203" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-2209", "url": "https://www.cve.org/CVERecord?id=CVE-2010-2209" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-2209", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2209" } ], "release_date": "2010-06-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-06-30T17:47:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:acroread-0:9.3.3-2.el4.i386", "4AS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "5Client-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0503" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:acroread-0:9.3.3-2.el4.i386", "4AS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "5Client-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "acroread: multiple code execution flaws (APSB10-15)" }, { "cve": "CVE-2010-2210", "discovery_date": "2010-06-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "609203" } ], "notes": [ { "category": "description", "text": "Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-1295, CVE-2010-2202, CVE-2010-2207, CVE-2010-2209, CVE-2010-2211, and CVE-2010-2212.", "title": "Vulnerability description" }, { "category": "summary", "text": "acroread: multiple code execution flaws (APSB10-15)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:acroread-0:9.3.3-2.el4.i386", "4AS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "5Client-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-2210" }, { "category": "external", "summary": "RHBZ#609203", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=609203" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-2210", "url": "https://www.cve.org/CVERecord?id=CVE-2010-2210" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-2210", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2210" } ], "release_date": "2010-06-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-06-30T17:47:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:acroread-0:9.3.3-2.el4.i386", "4AS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "5Client-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0503" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:acroread-0:9.3.3-2.el4.i386", "4AS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "5Client-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "acroread: multiple code execution flaws (APSB10-15)" }, { "cve": "CVE-2010-2211", "discovery_date": "2010-06-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "609203" } ], "notes": [ { "category": "description", "text": "Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-1295, CVE-2010-2202, CVE-2010-2207, CVE-2010-2209, CVE-2010-2210, and CVE-2010-2212.", "title": "Vulnerability description" }, { "category": "summary", "text": "acroread: multiple code execution flaws (APSB10-15)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:acroread-0:9.3.3-2.el4.i386", "4AS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "5Client-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-2211" }, { "category": "external", "summary": "RHBZ#609203", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=609203" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-2211", "url": "https://www.cve.org/CVERecord?id=CVE-2010-2211" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-2211", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2211" } ], "release_date": "2010-06-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-06-30T17:47:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:acroread-0:9.3.3-2.el4.i386", "4AS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "5Client-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0503" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:acroread-0:9.3.3-2.el4.i386", "4AS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "5Client-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "acroread: multiple code execution flaws (APSB10-15)" }, { "cve": "CVE-2010-2212", "discovery_date": "2010-06-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "609203" } ], "notes": [ { "category": "description", "text": "Buffer overflow in Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a PDF file containing Flash content with a crafted #1023 (3FFh) tag, a different vulnerability than CVE-2010-1295, CVE-2010-2202, CVE-2010-2207, CVE-2010-2209, CVE-2010-2210, and CVE-2010-2211.", "title": "Vulnerability description" }, { "category": "summary", "text": "acroread: multiple code execution flaws (APSB10-15)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:acroread-0:9.3.3-2.el4.i386", "4AS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "5Client-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-2212" }, { "category": "external", "summary": "RHBZ#609203", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=609203" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-2212", "url": "https://www.cve.org/CVERecord?id=CVE-2010-2212" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-2212", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2212" } ], "release_date": "2010-06-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-06-30T17:47:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:acroread-0:9.3.3-2.el4.i386", "4AS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "5Client-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0503" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:acroread-0:9.3.3-2.el4.i386", "4AS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-0:9.3.3-2.el4.i386", "4Desktop-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-0:9.3.3-2.el4.i386", "4ES-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-0:9.3.3-2.el4.i386", "4WS-LACD:acroread-plugin-0:9.3.3-2.el4.i386", "5Client-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Client-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-0:9.3.3-1.el5.i386", "5Server-Supplementary:acroread-plugin-0:9.3.3-1.el5.i386" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "acroread: multiple code execution flaws (APSB10-15)" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.