TROYANOSYVIRUS
Volver a CVEs

CVE-2010-2883

HIGHCISA KEV
7.3

Descripcion

Stack-based buffer overflow in CoolType.dll in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a PDF document with a long field in a Smart INdependent Glyphlets (SING) table in a TTF font, as exploited in the wild in September 2010. NOTE: some of these details are obtained from third party information.

Detalles CVE

Puntuacion CVSS v3.17.3
SeveridadHIGH
Vector CVSSCVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Vector de ataqueLOCAL
ComplejidadLOW
Privilegios requeridosLOW
Interaccion usuarioREQUIRED
Publicado9/9/2010
Ultima modificacion4/21/2026
Fuentekev
Avistamientos honeypot0

CISA KEV

VendedorAdobe
ProductoAcrobat and Reader
Nombre vulnerabilidadAdobe Acrobat and Reader Stack-Based Buffer Overflow Vulnerability
Fecha inclusion KEV2022-06-08
Fecha limite remediacion2022-06-22
Uso en ransomwareUnknown

Productos afectados

adobe:acrobatadobe:acrobat_readerapple:macosmicrosoft:windows

Debilidades (CWE)

CWE-787CWE-787

Referencias

http://secunia.com/advisories/41340(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/43025(af854a3a-2127-422b-91ae-364da2661108)
http://security.gentoo.org/glsa/glsa-201101-08.xml(af854a3a-2127-422b-91ae-364da2661108)
http://www.kb.cert.org/vuls/id/491991(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2010-0743.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/43057(af854a3a-2127-422b-91ae-364da2661108)
http://www.us-cert.gov/cas/techalerts/TA10-279A.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2010/2331(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2011/0191(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2011/0344(af854a3a-2127-422b-91ae-364da2661108)

Correlaciones IOC

Sin correlaciones registradas

This product uses data from the NVD API but is not endorsed or certified by the NVD.