Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64; Adobe AIR before 2.0.2.12610; and Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted SWF content, related to authplay.dll and the ActionScript Virtual Machine 2 (AVM2) newfunction instruction, as exploited in the wild in June 2010.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
|
History
21 Nov 2024, 01:14
Type | Values Removed | Values Added |
---|---|---|
References | () http://blog.zynamics.com/2010/06/09/analyzing-the-currently-exploited-0-day-for-adobe-reader-and-adobe-flash/ - Exploit | |
References | () http://community.websense.com/blogs/securitylabs/archive/2010/06/09/having-fun-with-adobe-0-day-exploits.aspx - Broken Link | |
References | () http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751 - Broken Link | |
References | () http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00000.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html - Mailing List, Third Party Advisory | |
References | () http://secunia.com/advisories/40026 - Broken Link, Vendor Advisory | |
References | () http://secunia.com/advisories/40034 - Broken Link, Vendor Advisory | |
References | () http://secunia.com/advisories/40144 - Broken Link | |
References | () http://secunia.com/advisories/40545 - Broken Link | |
References | () http://secunia.com/advisories/43026 - Broken Link | |
References | () http://security.gentoo.org/glsa/glsa-201101-09.xml - Third Party Advisory | |
References | () http://securitytracker.com/id?1024057 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://securitytracker.com/id?1024058 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://securitytracker.com/id?1024085 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://securitytracker.com/id?1024086 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://support.apple.com/kb/HT4435 - Broken Link | |
References | () http://www.adobe.com/support/security/advisories/apsa10-01.html - Vendor Advisory | |
References | () http://www.adobe.com/support/security/bulletins/apsb10-14.html - Not Applicable | |
References | () http://www.adobe.com/support/security/bulletins/apsb10-15.html - Not Applicable | |
References | () http://www.exploit-db.com/exploits/13787 - Third Party Advisory, VDB Entry | |
References | () http://www.kb.cert.org/vuls/id/486225 - Third Party Advisory, US Government Resource | |
References | () http://www.osvdb.org/65141 - Broken Link | |
References | () http://www.redhat.com/support/errata/RHSA-2010-0464.html - Broken Link | |
References | () http://www.redhat.com/support/errata/RHSA-2010-0470.html - Broken Link | |
References | () http://www.securityfocus.com/bid/40586 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.securityfocus.com/bid/40759 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.turbolinux.co.jp/security/2010/TLSA-2010-19j.txt - Broken Link | |
References | () http://www.us-cert.gov/cas/techalerts/TA10-159A.html - Third Party Advisory, US Government Resource | |
References | () http://www.us-cert.gov/cas/techalerts/TA10-162A.html - Third Party Advisory, US Government Resource | |
References | () http://www.vupen.com/english/advisories/2010/1348 - Broken Link, Vendor Advisory | |
References | () http://www.vupen.com/english/advisories/2010/1349 - Broken Link, Vendor Advisory | |
References | () http://www.vupen.com/english/advisories/2010/1421 - Broken Link | |
References | () http://www.vupen.com/english/advisories/2010/1432 - Broken Link | |
References | () http://www.vupen.com/english/advisories/2010/1434 - Broken Link | |
References | () http://www.vupen.com/english/advisories/2010/1453 - Broken Link | |
References | () http://www.vupen.com/english/advisories/2010/1482 - Broken Link | |
References | () http://www.vupen.com/english/advisories/2010/1522 - Broken Link | |
References | () http://www.vupen.com/english/advisories/2010/1636 - Broken Link | |
References | () http://www.vupen.com/english/advisories/2010/1793 - Broken Link | |
References | () http://www.vupen.com/english/advisories/2011/0192 - Broken Link | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/59137 - Third Party Advisory, VDB Entry | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7116 - Broken Link |
28 Jun 2024, 14:20
Type | Values Removed | Values Added |
---|---|---|
First Time |
Suse linux Enterprise
Microsoft Suse Opensuse opensuse Apple mac Os X Adobe air Microsoft windows Opensuse Apple |
|
CVSS |
v2 : v3 : |
v2 : 9.3
v3 : 7.8 |
CWE | CWE-787 | |
References | () http://blog.zynamics.com/2010/06/09/analyzing-the-currently-exploited-0-day-for-adobe-reader-and-adobe-flash/ - Exploit | |
References | () http://community.websense.com/blogs/securitylabs/archive/2010/06/09/having-fun-with-adobe-0-day-exploits.aspx - Broken Link | |
References | () http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751 - Broken Link | |
References | () http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00000.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html - Mailing List, Third Party Advisory | |
References | () http://secunia.com/advisories/40026 - Broken Link, Vendor Advisory | |
References | () http://secunia.com/advisories/40034 - Broken Link, Vendor Advisory | |
References | () http://secunia.com/advisories/40144 - Broken Link | |
References | () http://secunia.com/advisories/40545 - Broken Link | |
References | () http://secunia.com/advisories/43026 - Broken Link | |
References | () http://security.gentoo.org/glsa/glsa-201101-09.xml - Third Party Advisory | |
References | () http://securitytracker.com/id?1024057 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://securitytracker.com/id?1024058 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://securitytracker.com/id?1024085 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://securitytracker.com/id?1024086 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://support.apple.com/kb/HT4435 - Broken Link | |
References | () http://www.adobe.com/support/security/bulletins/apsb10-14.html - Not Applicable | |
References | () http://www.adobe.com/support/security/bulletins/apsb10-15.html - Not Applicable | |
References | () http://www.exploit-db.com/exploits/13787 - Third Party Advisory, VDB Entry | |
References | () http://www.kb.cert.org/vuls/id/486225 - Third Party Advisory, US Government Resource | |
References | () http://www.osvdb.org/65141 - Broken Link | |
References | () http://www.redhat.com/support/errata/RHSA-2010-0464.html - Broken Link | |
References | () http://www.redhat.com/support/errata/RHSA-2010-0470.html - Broken Link | |
References | () http://www.securityfocus.com/bid/40586 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.securityfocus.com/bid/40759 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.turbolinux.co.jp/security/2010/TLSA-2010-19j.txt - Broken Link | |
References | () http://www.us-cert.gov/cas/techalerts/TA10-159A.html - Third Party Advisory, US Government Resource | |
References | () http://www.us-cert.gov/cas/techalerts/TA10-162A.html - Third Party Advisory, US Government Resource | |
References | () http://www.vupen.com/english/advisories/2010/1348 - Broken Link, Vendor Advisory | |
References | () http://www.vupen.com/english/advisories/2010/1349 - Broken Link, Vendor Advisory | |
References | () http://www.vupen.com/english/advisories/2010/1421 - Broken Link | |
References | () http://www.vupen.com/english/advisories/2010/1432 - Broken Link | |
References | () http://www.vupen.com/english/advisories/2010/1434 - Broken Link | |
References | () http://www.vupen.com/english/advisories/2010/1453 - Broken Link | |
References | () http://www.vupen.com/english/advisories/2010/1482 - Broken Link | |
References | () http://www.vupen.com/english/advisories/2010/1522 - Broken Link | |
References | () http://www.vupen.com/english/advisories/2010/1636 - Broken Link | |
References | () http://www.vupen.com/english/advisories/2010/1793 - Broken Link | |
References | () http://www.vupen.com/english/advisories/2011/0192 - Broken Link | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/59137 - Third Party Advisory, VDB Entry | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7116 - Broken Link | |
CPE | cpe:2.3:a:adobe:flash_player:9.0.159.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:* cpe:2.3:a:adobe:flash_player:9.0.246.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:flash_player:10.0.12.10:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:flash_player:10.0.0.584:*:*:*:*:*:*:* cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:flash_player:10.0.32.18:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:* cpe:2.3:a:adobe:flash_player:10.0.42.34:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:* cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:flash_player:9.0.151.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:flash_player:9.0.124.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.1.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:flash_player:10.0.15.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:flash_player:9.0.260.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.3.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.3.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:flash_player:9.0.152.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:* cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.1.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:flash_player:10.0.22.87:*:*:*:*:*:*:* cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:* cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:flash_player:10.0.12.36:*:*:*:*:*:*:* |
cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:* cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise:11.0:-:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise:10.0:sp3:*:*:*:*:*:* cpe:2.3:o:opensuse:opensuse:*:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise:11.0:sp1:*:*:*:*:*:* |
Information
Published : 2010-06-08 18:30
Updated : 2024-11-21 01:14
NVD link : CVE-2010-1297
Mitre link : CVE-2010-1297
CVE.ORG link : CVE-2010-1297
JSON object : View
Products Affected
adobe
- flash_player
- acrobat
- air
microsoft
- windows
suse
- linux_enterprise
opensuse
- opensuse
apple
- mac_os_x
CWE
CWE-787
Out-of-bounds Write