CVE-2011-0610 (GCVE-0-2011-0610)

Vulnerability from cvelistv5 – Published: 2011-05-03 19:00 – Updated: 2024-08-06 21:58
VLAI?
Summary
The CoolType library in Adobe Reader 9.x before 9.4.4 and 10.x through 10.0.1 on Windows, Adobe Reader 9.x before 9.4.4 and 10.x before 10.0.3 on Mac OS X, and Adobe Acrobat 9.x before 9.4.4 and 10.x before 10.0.3 on Windows and Mac OS X allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T21:58:25.961Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "oval:org.mitre.oval:def:13967",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13967"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.adobe.com/support/security/bulletins/apsb11-08.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-04-21T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The CoolType library in Adobe Reader 9.x before 9.4.4 and 10.x through 10.0.1 on Windows, Adobe Reader 9.x before 9.4.4 and 10.x before 10.0.3 on Mac OS X, and Adobe Acrobat 9.x before 9.4.4 and 10.x before 10.0.3 on Windows and Mac OS X allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-18T12:57:01",
        "orgId": "078d4453-3bcd-4900-85e6-15281da43538",
        "shortName": "adobe"
      },
      "references": [
        {
          "name": "oval:org.mitre.oval:def:13967",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13967"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.adobe.com/support/security/bulletins/apsb11-08.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@adobe.com",
          "ID": "CVE-2011-0610",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The CoolType library in Adobe Reader 9.x before 9.4.4 and 10.x through 10.0.1 on Windows, Adobe Reader 9.x before 9.4.4 and 10.x before 10.0.3 on Mac OS X, and Adobe Acrobat 9.x before 9.4.4 and 10.x before 10.0.3 on Windows and Mac OS X allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "oval:org.mitre.oval:def:13967",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13967"
            },
            {
              "name": "http://www.adobe.com/support/security/bulletins/apsb11-08.html",
              "refsource": "CONFIRM",
              "url": "http://www.adobe.com/support/security/bulletins/apsb11-08.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538",
    "assignerShortName": "adobe",
    "cveId": "CVE-2011-0610",
    "datePublished": "2011-05-03T19:00:00",
    "dateReserved": "2011-01-20T00:00:00",
    "dateUpdated": "2024-08-06T21:58:25.961Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"562772F1-1627-438E-A6B8-7D1AA5536086\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"27D5AF92-A8E1-41BD-B20A-EB26BB6AD4DE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F25C9167-C6D4-4264-9197-50878EDA2D96\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DD1D7308-09E9-42B2-8836-DC2326C62A9E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat_reader:9.1.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B5C251D2-4C9B-4029-8BED-0FCAED3B8E89\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat_reader:9.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2432AC17-5378-4C61-A775-5172FD44EC03\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat_reader:9.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B6BA82F4-470D-4A46-89B2-D2F3C8FA31C8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat_reader:9.3.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BCCA5699-BBF7-4112-B1E9-612A1CB260F6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat_reader:9.3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"39EDED39-664F-4B68-B422-2CCCA3B83550\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat_reader:9.3.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B508C5CE-1386-47B3-B301-B78DBB3A75D9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat_reader:9.3.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DDC2EEB6-D5EC-430F-962A-1279C9970441\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat_reader:9.3.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8DC590C7-5BDE-4E46-9605-01E95B17F01F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat_reader:9.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DCFE67F4-6907-4967-96A3-1757EADA72BB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat_reader:9.4.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"41DFBB39-4BC6-48BB-B66E-99DA4C7DBCE4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat_reader:9.4.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A328CC7F-5D02-4C7C-82CE-139EB2689C18\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat_reader:9.4.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0F56EC75-4C65-4CD7-981D-823E1411CD6F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat_reader:10.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9731EFE2-A5BE-4389-A92D-DDC573633B6C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat_reader:10.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F9B4B357-27C7-4926-936C-A100A7AD538B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2CF61F35-5905-4BA9-AD7E-7DB261D2F256\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"562772F1-1627-438E-A6B8-7D1AA5536086\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"27D5AF92-A8E1-41BD-B20A-EB26BB6AD4DE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F25C9167-C6D4-4264-9197-50878EDA2D96\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DD1D7308-09E9-42B2-8836-DC2326C62A9E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat_reader:9.1.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B5C251D2-4C9B-4029-8BED-0FCAED3B8E89\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat_reader:9.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2432AC17-5378-4C61-A775-5172FD44EC03\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat_reader:9.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B6BA82F4-470D-4A46-89B2-D2F3C8FA31C8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat_reader:9.3.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BCCA5699-BBF7-4112-B1E9-612A1CB260F6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat_reader:9.3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"39EDED39-664F-4B68-B422-2CCCA3B83550\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat_reader:9.3.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B508C5CE-1386-47B3-B301-B78DBB3A75D9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat_reader:9.3.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DDC2EEB6-D5EC-430F-962A-1279C9970441\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat_reader:9.3.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8DC590C7-5BDE-4E46-9605-01E95B17F01F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat_reader:9.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DCFE67F4-6907-4967-96A3-1757EADA72BB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat_reader:9.4.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"41DFBB39-4BC6-48BB-B66E-99DA4C7DBCE4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat_reader:9.4.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A328CC7F-5D02-4C7C-82CE-139EB2689C18\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat_reader:9.4.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0F56EC75-4C65-4CD7-981D-823E1411CD6F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat_reader:10.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9731EFE2-A5BE-4389-A92D-DDC573633B6C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat_reader:10.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F9B4B357-27C7-4926-936C-A100A7AD538B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat_reader:10.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4DEE3D3B-C94C-4A85-B2C2-E4A72A88F4FD\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0FF5999A-9D12-4CDD-8DE9-A89C10B2D574\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5AA53564-9ACD-4CFB-9AAC-A77440026A57\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C7EC46E3-77B7-4455-B3E0-A45C6B69B3DC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4F475858-DCE2-4C93-A51A-04718DF17593\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"88687272-4CD0-42A2-B727-C322ABDE3549\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat:9.1.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1E5C4FA4-3786-47AF-BD7D-8E75927EB3AA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat:9.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B35CC915-EEE3-4E86-9E09-1893C725E07B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat:9.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"76201694-E5C5-4CA3-8919-46937AFDAAE3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat:9.3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"397AB988-1C2C-4247-9B34-806094197CB5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat:9.3.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8FA0B8C3-8060-4685-A241-9852BD63B7A0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat:9.3.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4AB9BBDE-634A-47CF-BA49-67382B547900\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat:9.3.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F56B1726-4F05-4732-9D8B-077EF593EAEC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat:9.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A258374F-55CB-48D2-9094-CD70E1288F60\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat:9.4.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"627B0DA4-E600-49F1-B455-B4E151B33236\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat:9.4.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"54BD8F96-BB75-4961-B1E0-049F2273100D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat:9.4.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9C14B310-65F0-475D-A2DD-0AD706805A99\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat:10.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B57C5136-7853-478B-A342-6013528B41B4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat:10.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CC1E1EE7-379E-4047-962D-0A311EB0DB1A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:acrobat:10.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C113D6BE-88CD-4670-A0FA-8E78EBAF9A81\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0FF5999A-9D12-4CDD-8DE9-A89C10B2D574\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2CF61F35-5905-4BA9-AD7E-7DB261D2F256\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"The CoolType library in Adobe Reader 9.x before 9.4.4 and 10.x through 10.0.1 on Windows, Adobe Reader 9.x before 9.4.4 and 10.x before 10.0.3 on Mac OS X, and Adobe Acrobat 9.x before 9.4.4 and 10.x before 10.0.3 on Windows and Mac OS X allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.\"}, {\"lang\": \"es\", \"value\": \"La librer\\u00eda CoolType v9.x en Adobe Reader antes de v9.4.4 y v10.x hasta v10.0.1 para Windows, Adobe Reader v9.x antes de v9.4.4 y v10.x antes de v10.0.3 para MacOS X, y Adobe Acrobat v9.x antes de v9.4.4 y v10.x antes de v10.0.3 para Windows y MacOS X permite a atacantes remotos ejecutar c\\u00f3digo de su elecci\\u00f3n o causar una denegaci\\u00f3n de servicio (corrupci\\u00f3n de memoria) a trav\\u00e9s de vectores no especificados.\\r\\n\"}]",
      "evaluatorComment": "Per: http://www.adobe.com/support/security/bulletins/apsb11-08.html\r\n\r\n\u0027Today\u0027s security updates are out-of-cycle updates.\u0027",
      "evaluatorImpact": "Per: http://www.adobe.com/support/security/bulletins/apsb11-08.html\r\n\r\n\u0027Severity rating\r\n\r\nAdobe categorizes these as critical updates and recommends affected users update their installations to the newest versions.\u0027",
      "id": "CVE-2011-0610",
      "lastModified": "2024-11-21T01:24:25.047",
      "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:C/I:C/A:C\", \"baseScore\": 9.3, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 8.6, \"impactScore\": 10.0, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}",
      "published": "2011-05-03T19:55:01.247",
      "references": "[{\"url\": \"http://www.adobe.com/support/security/bulletins/apsb11-08.html\", \"source\": \"psirt@adobe.com\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13967\", \"source\": \"psirt@adobe.com\"}, {\"url\": \"http://www.adobe.com/support/security/bulletins/apsb11-08.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13967\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
      "sourceIdentifier": "psirt@adobe.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-119\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2011-0610\",\"sourceIdentifier\":\"psirt@adobe.com\",\"published\":\"2011-05-03T19:55:01.247\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The CoolType library in Adobe Reader 9.x before 9.4.4 and 10.x through 10.0.1 on Windows, Adobe Reader 9.x before 9.4.4 and 10.x before 10.0.3 on Mac OS X, and Adobe Acrobat 9.x before 9.4.4 and 10.x before 10.0.3 on Windows and Mac OS X allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.\"},{\"lang\":\"es\",\"value\":\"La librer\u00eda CoolType v9.x en Adobe Reader antes de v9.4.4 y v10.x hasta v10.0.1 para Windows, Adobe Reader v9.x antes de v9.4.4 y v10.x antes de v10.0.3 para MacOS X, y Adobe Acrobat v9.x antes de v9.4.4 y v10.x antes de v10.0.3 para Windows y MacOS X permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados.\\r\\n\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:C/I:C/A:C\",\"baseScore\":9.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.6,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"562772F1-1627-438E-A6B8-7D1AA5536086\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27D5AF92-A8E1-41BD-B20A-EB26BB6AD4DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F25C9167-C6D4-4264-9197-50878EDA2D96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD1D7308-09E9-42B2-8836-DC2326C62A9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:9.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5C251D2-4C9B-4029-8BED-0FCAED3B8E89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:9.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2432AC17-5378-4C61-A775-5172FD44EC03\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:9.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6BA82F4-470D-4A46-89B2-D2F3C8FA31C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:9.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BCCA5699-BBF7-4112-B1E9-612A1CB260F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:9.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39EDED39-664F-4B68-B422-2CCCA3B83550\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:9.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B508C5CE-1386-47B3-B301-B78DBB3A75D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:9.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DDC2EEB6-D5EC-430F-962A-1279C9970441\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:9.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DC590C7-5BDE-4E46-9605-01E95B17F01F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:9.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCFE67F4-6907-4967-96A3-1757EADA72BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:9.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41DFBB39-4BC6-48BB-B66E-99DA4C7DBCE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:9.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A328CC7F-5D02-4C7C-82CE-139EB2689C18\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:9.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F56EC75-4C65-4CD7-981D-823E1411CD6F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9731EFE2-A5BE-4389-A92D-DDC573633B6C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:10.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9B4B357-27C7-4926-936C-A100A7AD538B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CF61F35-5905-4BA9-AD7E-7DB261D2F256\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"562772F1-1627-438E-A6B8-7D1AA5536086\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27D5AF92-A8E1-41BD-B20A-EB26BB6AD4DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F25C9167-C6D4-4264-9197-50878EDA2D96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD1D7308-09E9-42B2-8836-DC2326C62A9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:9.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5C251D2-4C9B-4029-8BED-0FCAED3B8E89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:9.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2432AC17-5378-4C61-A775-5172FD44EC03\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:9.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6BA82F4-470D-4A46-89B2-D2F3C8FA31C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:9.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BCCA5699-BBF7-4112-B1E9-612A1CB260F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:9.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39EDED39-664F-4B68-B422-2CCCA3B83550\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:9.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B508C5CE-1386-47B3-B301-B78DBB3A75D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:9.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DDC2EEB6-D5EC-430F-962A-1279C9970441\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:9.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DC590C7-5BDE-4E46-9605-01E95B17F01F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:9.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCFE67F4-6907-4967-96A3-1757EADA72BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:9.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41DFBB39-4BC6-48BB-B66E-99DA4C7DBCE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:9.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A328CC7F-5D02-4C7C-82CE-139EB2689C18\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:9.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F56EC75-4C65-4CD7-981D-823E1411CD6F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9731EFE2-A5BE-4389-A92D-DDC573633B6C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:10.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9B4B357-27C7-4926-936C-A100A7AD538B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:10.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DEE3D3B-C94C-4A85-B2C2-E4A72A88F4FD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FF5999A-9D12-4CDD-8DE9-A89C10B2D574\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AA53564-9ACD-4CFB-9AAC-A77440026A57\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7EC46E3-77B7-4455-B3E0-A45C6B69B3DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F475858-DCE2-4C93-A51A-04718DF17593\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88687272-4CD0-42A2-B727-C322ABDE3549\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:9.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E5C4FA4-3786-47AF-BD7D-8E75927EB3AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:9.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B35CC915-EEE3-4E86-9E09-1893C725E07B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:9.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76201694-E5C5-4CA3-8919-46937AFDAAE3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:9.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"397AB988-1C2C-4247-9B34-806094197CB5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:9.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FA0B8C3-8060-4685-A241-9852BD63B7A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:9.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4AB9BBDE-634A-47CF-BA49-67382B547900\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:9.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F56B1726-4F05-4732-9D8B-077EF593EAEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:9.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A258374F-55CB-48D2-9094-CD70E1288F60\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:9.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"627B0DA4-E600-49F1-B455-B4E151B33236\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:9.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54BD8F96-BB75-4961-B1E0-049F2273100D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:9.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C14B310-65F0-475D-A2DD-0AD706805A99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B57C5136-7853-478B-A342-6013528B41B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:10.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC1E1EE7-379E-4047-962D-0A311EB0DB1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:10.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C113D6BE-88CD-4670-A0FA-8E78EBAF9A81\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FF5999A-9D12-4CDD-8DE9-A89C10B2D574\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CF61F35-5905-4BA9-AD7E-7DB261D2F256\"}]}]}],\"references\":[{\"url\":\"http://www.adobe.com/support/security/bulletins/apsb11-08.html\",\"source\":\"psirt@adobe.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13967\",\"source\":\"psirt@adobe.com\"},{\"url\":\"http://www.adobe.com/support/security/bulletins/apsb11-08.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13967\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}],\"evaluatorComment\":\"Per: http://www.adobe.com/support/security/bulletins/apsb11-08.html\\r\\n\\r\\n\u0027Today\u0027s security updates are out-of-cycle updates.\u0027\",\"evaluatorImpact\":\"Per: http://www.adobe.com/support/security/bulletins/apsb11-08.html\\r\\n\\r\\n\u0027Severity rating\\r\\n\\r\\nAdobe categorizes these as critical updates and recommends affected users update their installations to the newest versions.\u0027\"}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…