TROYANOSYVIRUS
Retour aux CVEs

CVE-2010-2883

HIGHCISA KEV
7.3

Description

Stack-based buffer overflow in CoolType.dll in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a PDF document with a long field in a Smart INdependent Glyphlets (SING) table in a TTF font, as exploited in the wild in September 2010. NOTE: some of these details are obtained from third party information.

Details CVE

Score CVSS v3.17.3
SeveriteHIGH
Vecteur CVSSCVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Vecteur d'attaqueLOCAL
ComplexiteLOW
Privileges requisLOW
Interaction utilisateurREQUIRED
Publie9/9/2010
Derniere modification4/21/2026
Sourcekev
Observations honeypot0

CISA KEV

FournisseurAdobe
ProduitAcrobat and Reader
Nom vulnerabiliteAdobe Acrobat and Reader Stack-Based Buffer Overflow Vulnerability
Date ajout KEV2022-06-08
Date limite remediation2022-06-22
Utilise dans ransomwareUnknown

Produits affectes

adobe:acrobatadobe:acrobat_readerapple:macosmicrosoft:windows

Faiblesses (CWE)

CWE-787CWE-787

References

http://secunia.com/advisories/41340(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/43025(af854a3a-2127-422b-91ae-364da2661108)
http://security.gentoo.org/glsa/glsa-201101-08.xml(af854a3a-2127-422b-91ae-364da2661108)
http://www.kb.cert.org/vuls/id/491991(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2010-0743.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/43057(af854a3a-2127-422b-91ae-364da2661108)
http://www.us-cert.gov/cas/techalerts/TA10-279A.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2010/2331(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2011/0191(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2011/0344(af854a3a-2127-422b-91ae-364da2661108)

Correlations IOC

Aucune correlation enregistree

This product uses data from the NVD API but is not endorsed or certified by the NVD.