TROYANOSYVIRUS
Voltar para CVEs

CVE-2010-2883

HIGHCISA KEV
7.3

Descricao

Stack-based buffer overflow in CoolType.dll in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a PDF document with a long field in a Smart INdependent Glyphlets (SING) table in a TTF font, as exploited in the wild in September 2010. NOTE: some of these details are obtained from third party information.

Detalhes CVE

Pontuacao CVSS v3.17.3
SeveridadeHIGH
Vetor CVSSCVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Vetor de ataqueLOCAL
ComplexidadeLOW
Privilegios necessariosLOW
Interacao do usuarioREQUIRED
Publicado9/9/2010
Ultima modificacao4/21/2026
Fontekev
Avistamentos honeypot0

CISA KEV

FornecedorAdobe
ProdutoAcrobat and Reader
Nome da vulnerabilidadeAdobe Acrobat and Reader Stack-Based Buffer Overflow Vulnerability
Data inclusao KEV2022-06-08
Prazo de remediacao2022-06-22
Uso em ransomwareUnknown

Produtos afetados

adobe:acrobatadobe:acrobat_readerapple:macosmicrosoft:windows

Fraquezas (CWE)

CWE-787CWE-787

Referencias

http://secunia.com/advisories/41340(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/43025(af854a3a-2127-422b-91ae-364da2661108)
http://security.gentoo.org/glsa/glsa-201101-08.xml(af854a3a-2127-422b-91ae-364da2661108)
http://www.kb.cert.org/vuls/id/491991(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2010-0743.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/43057(af854a3a-2127-422b-91ae-364da2661108)
http://www.us-cert.gov/cas/techalerts/TA10-279A.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2010/2331(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2011/0191(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2011/0344(af854a3a-2127-422b-91ae-364da2661108)

Correlacoes IOC

Sem correlacoes registradas

This product uses data from the NVD API but is not endorsed or certified by the NVD.