CVE-2010-2161

Array index error in Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, might allow attackers to execute arbitrary code via unspecified "types of Adobe Flash code."
References
Link Resource
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=871
http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html
http://secunia.com/advisories/40144
http://secunia.com/advisories/40545
http://secunia.com/advisories/43026
http://security.gentoo.org/glsa/glsa-201101-09.xml
http://securitytracker.com/id?1024085
http://securitytracker.com/id?1024086
http://support.apple.com/kb/HT4435
http://www.adobe.com/support/security/bulletins/apsb10-14.html Patch Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2010-0464.html
http://www.redhat.com/support/errata/RHSA-2010-0470.html
http://www.securityfocus.com/bid/40759
http://www.securityfocus.com/bid/40781
http://www.turbolinux.co.jp/security/2010/TLSA-2010-19j.txt
http://www.us-cert.gov/cas/techalerts/TA10-162A.html US Government Resource
http://www.vupen.com/english/advisories/2010/1421
http://www.vupen.com/english/advisories/2010/1432
http://www.vupen.com/english/advisories/2010/1434
http://www.vupen.com/english/advisories/2010/1453
http://www.vupen.com/english/advisories/2010/1482
http://www.vupen.com/english/advisories/2010/1522
http://www.vupen.com/english/advisories/2010/1793
http://www.vupen.com/english/advisories/2011/0192
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15576
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7303
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=871
http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html
http://secunia.com/advisories/40144
http://secunia.com/advisories/40545
http://secunia.com/advisories/43026
http://security.gentoo.org/glsa/glsa-201101-09.xml
http://securitytracker.com/id?1024085
http://securitytracker.com/id?1024086
http://support.apple.com/kb/HT4435
http://www.adobe.com/support/security/bulletins/apsb10-14.html Patch Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2010-0464.html
http://www.redhat.com/support/errata/RHSA-2010-0470.html
http://www.securityfocus.com/bid/40759
http://www.securityfocus.com/bid/40781
http://www.turbolinux.co.jp/security/2010/TLSA-2010-19j.txt
http://www.us-cert.gov/cas/techalerts/TA10-162A.html US Government Resource
http://www.vupen.com/english/advisories/2010/1421
http://www.vupen.com/english/advisories/2010/1432
http://www.vupen.com/english/advisories/2010/1434
http://www.vupen.com/english/advisories/2010/1453
http://www.vupen.com/english/advisories/2010/1482
http://www.vupen.com/english/advisories/2010/1522
http://www.vupen.com/english/advisories/2010/1793
http://www.vupen.com/english/advisories/2011/0192
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15576
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7303
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.124.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.125.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.151.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.152.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.159.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.246.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.260.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.262.0:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:10.0.0.584:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:10.0.12.10:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:10.0.12.36:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:10.0.15.3:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:10.0.22.87:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:10.0.32.18:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:10.0.42.34:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:adobe:flash_player:6.0.79:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:7.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:7.0.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:7.0.14.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:7.0.19.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:7.0.24.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:7.0.25:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:7.0.53.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:7.0.60.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:7.0.61.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:7.0.63:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:7.0.66.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:7.0.67.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:7.0.68.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:7.0.70.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:7.0.73.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:7.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:7.1.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:7.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:8.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:8.0.22.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:8.0.24.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:8.0.33.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:8.0.34.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:8.0.35.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:8.0.42.0:*:*:*:*:*:*:*
cpe:2.3:a:macromedia:flash_player:5.0:*:*:*:*:*:*:*
cpe:2.3:a:macromedia:flash_player:5.0.30.0:*:*:*:*:*:*:*
cpe:2.3:a:macromedia:flash_player:5.0.41.0:*:*:*:*:*:*:*
cpe:2.3:a:macromedia:flash_player:5.0.42.0:*:*:*:*:*:*:*
cpe:2.3:a:macromedia:flash_player:5.0.58.0:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*
cpe:2.3:a:adobe:air:1.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:air:1.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:air:1.5:*:*:*:*:*:*:*
cpe:2.3:a:adobe:air:1.5.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:air:1.5.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:air:1.5.3:*:*:*:*:*:*:*

History

21 Nov 2024, 01:16

Type Values Removed Values Added
References () http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751 - () http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751 -
References () http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=871 - () http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=871 -
References () http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html - () http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html -
References () http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00000.html - () http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00000.html -
References () http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html - () http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html -
References () http://secunia.com/advisories/40144 - () http://secunia.com/advisories/40144 -
References () http://secunia.com/advisories/40545 - () http://secunia.com/advisories/40545 -
References () http://secunia.com/advisories/43026 - () http://secunia.com/advisories/43026 -
References () http://security.gentoo.org/glsa/glsa-201101-09.xml - () http://security.gentoo.org/glsa/glsa-201101-09.xml -
References () http://securitytracker.com/id?1024085 - () http://securitytracker.com/id?1024085 -
References () http://securitytracker.com/id?1024086 - () http://securitytracker.com/id?1024086 -
References () http://support.apple.com/kb/HT4435 - () http://support.apple.com/kb/HT4435 -
References () http://www.adobe.com/support/security/bulletins/apsb10-14.html - Patch, Vendor Advisory () http://www.adobe.com/support/security/bulletins/apsb10-14.html - Patch, Vendor Advisory
References () http://www.redhat.com/support/errata/RHSA-2010-0464.html - () http://www.redhat.com/support/errata/RHSA-2010-0464.html -
References () http://www.redhat.com/support/errata/RHSA-2010-0470.html - () http://www.redhat.com/support/errata/RHSA-2010-0470.html -
References () http://www.securityfocus.com/bid/40759 - () http://www.securityfocus.com/bid/40759 -
References () http://www.securityfocus.com/bid/40781 - () http://www.securityfocus.com/bid/40781 -
References () http://www.turbolinux.co.jp/security/2010/TLSA-2010-19j.txt - () http://www.turbolinux.co.jp/security/2010/TLSA-2010-19j.txt -
References () http://www.us-cert.gov/cas/techalerts/TA10-162A.html - US Government Resource () http://www.us-cert.gov/cas/techalerts/TA10-162A.html - US Government Resource
References () http://www.vupen.com/english/advisories/2010/1421 - () http://www.vupen.com/english/advisories/2010/1421 -
References () http://www.vupen.com/english/advisories/2010/1432 - () http://www.vupen.com/english/advisories/2010/1432 -
References () http://www.vupen.com/english/advisories/2010/1434 - () http://www.vupen.com/english/advisories/2010/1434 -
References () http://www.vupen.com/english/advisories/2010/1453 - () http://www.vupen.com/english/advisories/2010/1453 -
References () http://www.vupen.com/english/advisories/2010/1482 - () http://www.vupen.com/english/advisories/2010/1482 -
References () http://www.vupen.com/english/advisories/2010/1522 - () http://www.vupen.com/english/advisories/2010/1522 -
References () http://www.vupen.com/english/advisories/2010/1793 - () http://www.vupen.com/english/advisories/2010/1793 -
References () http://www.vupen.com/english/advisories/2011/0192 - () http://www.vupen.com/english/advisories/2011/0192 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15576 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15576 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7303 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7303 -

Information

Published : 2010-06-15 18:00

Updated : 2024-11-21 01:16


NVD link : CVE-2010-2161

Mitre link : CVE-2010-2161

CVE.ORG link : CVE-2010-2161


JSON object : View

Products Affected

adobe

  • air
  • flash_player

macromedia

  • flash_player
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')