CVE-2010-2164

Use-after-free vulnerability in Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, might allow attackers to execute arbitrary code via unspecified vectors related to an unspecified "image type within a certain function."
References
Link Resource
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=872
http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html
http://secunia.com/advisories/40144 Vendor Advisory
http://secunia.com/advisories/40545 Vendor Advisory
http://secunia.com/advisories/43026 Vendor Advisory
http://security.gentoo.org/glsa/glsa-201101-09.xml
http://securitytracker.com/id?1024085
http://securitytracker.com/id?1024086
http://support.apple.com/kb/HT4435
http://www.adobe.com/support/security/bulletins/apsb10-14.html Patch Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2010-0464.html
http://www.redhat.com/support/errata/RHSA-2010-0470.html
http://www.securityfocus.com/bid/40759
http://www.securityfocus.com/bid/40780
http://www.turbolinux.co.jp/security/2010/TLSA-2010-19j.txt
http://www.us-cert.gov/cas/techalerts/TA10-162A.html US Government Resource
http://www.vupen.com/english/advisories/2010/1421 Vendor Advisory
http://www.vupen.com/english/advisories/2010/1432 Vendor Advisory
http://www.vupen.com/english/advisories/2010/1434 Vendor Advisory
http://www.vupen.com/english/advisories/2010/1453 Vendor Advisory
http://www.vupen.com/english/advisories/2010/1482 Vendor Advisory
http://www.vupen.com/english/advisories/2010/1522 Vendor Advisory
http://www.vupen.com/english/advisories/2010/1793 Vendor Advisory
http://www.vupen.com/english/advisories/2011/0192 Vendor Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15798
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6765
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=872
http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html
http://secunia.com/advisories/40144 Vendor Advisory
http://secunia.com/advisories/40545 Vendor Advisory
http://secunia.com/advisories/43026 Vendor Advisory
http://security.gentoo.org/glsa/glsa-201101-09.xml
http://securitytracker.com/id?1024085
http://securitytracker.com/id?1024086
http://support.apple.com/kb/HT4435
http://www.adobe.com/support/security/bulletins/apsb10-14.html Patch Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2010-0464.html
http://www.redhat.com/support/errata/RHSA-2010-0470.html
http://www.securityfocus.com/bid/40759
http://www.securityfocus.com/bid/40780
http://www.turbolinux.co.jp/security/2010/TLSA-2010-19j.txt
http://www.us-cert.gov/cas/techalerts/TA10-162A.html US Government Resource
http://www.vupen.com/english/advisories/2010/1421 Vendor Advisory
http://www.vupen.com/english/advisories/2010/1432 Vendor Advisory
http://www.vupen.com/english/advisories/2010/1434 Vendor Advisory
http://www.vupen.com/english/advisories/2010/1453 Vendor Advisory
http://www.vupen.com/english/advisories/2010/1482 Vendor Advisory
http://www.vupen.com/english/advisories/2010/1522 Vendor Advisory
http://www.vupen.com/english/advisories/2010/1793 Vendor Advisory
http://www.vupen.com/english/advisories/2011/0192 Vendor Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15798
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6765
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.124.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.125.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.151.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.152.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.159.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.246.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.260.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.262.0:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:10.0.0.584:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:10.0.12.10:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:10.0.12.36:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:10.0.15.3:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:10.0.22.87:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:10.0.32.18:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:10.0.42.34:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:adobe:flash_player:6.0.79:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:7.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:7.0.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:7.0.14.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:7.0.19.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:7.0.24.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:7.0.25:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:7.0.53.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:7.0.60.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:7.0.61.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:7.0.63:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:7.0.66.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:7.0.67.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:7.0.68.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:7.0.70.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:7.0.73.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:7.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:7.1.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:7.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:8.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:8.0.22.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:8.0.24.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:8.0.33.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:8.0.34.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:8.0.35.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:8.0.42.0:*:*:*:*:*:*:*
cpe:2.3:a:macromedia:flash_player:5.0:*:*:*:*:*:*:*
cpe:2.3:a:macromedia:flash_player:5.0.30.0:*:*:*:*:*:*:*
cpe:2.3:a:macromedia:flash_player:5.0.41.0:*:*:*:*:*:*:*
cpe:2.3:a:macromedia:flash_player:5.0.42.0:*:*:*:*:*:*:*
cpe:2.3:a:macromedia:flash_player:5.0.58.0:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*
cpe:2.3:a:adobe:air:1.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:air:1.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:air:1.5:*:*:*:*:*:*:*
cpe:2.3:a:adobe:air:1.5.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:air:1.5.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:air:1.5.3:*:*:*:*:*:*:*

History

21 Nov 2024, 01:16

Type Values Removed Values Added
References () http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751 - () http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751 -
References () http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=872 - () http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=872 -
References () http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html - () http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html -
References () http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00000.html - () http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00000.html -
References () http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html - () http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html -
References () http://secunia.com/advisories/40144 - Vendor Advisory () http://secunia.com/advisories/40144 - Vendor Advisory
References () http://secunia.com/advisories/40545 - Vendor Advisory () http://secunia.com/advisories/40545 - Vendor Advisory
References () http://secunia.com/advisories/43026 - Vendor Advisory () http://secunia.com/advisories/43026 - Vendor Advisory
References () http://security.gentoo.org/glsa/glsa-201101-09.xml - () http://security.gentoo.org/glsa/glsa-201101-09.xml -
References () http://securitytracker.com/id?1024085 - () http://securitytracker.com/id?1024085 -
References () http://securitytracker.com/id?1024086 - () http://securitytracker.com/id?1024086 -
References () http://support.apple.com/kb/HT4435 - () http://support.apple.com/kb/HT4435 -
References () http://www.adobe.com/support/security/bulletins/apsb10-14.html - Patch, Vendor Advisory () http://www.adobe.com/support/security/bulletins/apsb10-14.html - Patch, Vendor Advisory
References () http://www.redhat.com/support/errata/RHSA-2010-0464.html - () http://www.redhat.com/support/errata/RHSA-2010-0464.html -
References () http://www.redhat.com/support/errata/RHSA-2010-0470.html - () http://www.redhat.com/support/errata/RHSA-2010-0470.html -
References () http://www.securityfocus.com/bid/40759 - () http://www.securityfocus.com/bid/40759 -
References () http://www.securityfocus.com/bid/40780 - () http://www.securityfocus.com/bid/40780 -
References () http://www.turbolinux.co.jp/security/2010/TLSA-2010-19j.txt - () http://www.turbolinux.co.jp/security/2010/TLSA-2010-19j.txt -
References () http://www.us-cert.gov/cas/techalerts/TA10-162A.html - US Government Resource () http://www.us-cert.gov/cas/techalerts/TA10-162A.html - US Government Resource
References () http://www.vupen.com/english/advisories/2010/1421 - Vendor Advisory () http://www.vupen.com/english/advisories/2010/1421 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2010/1432 - Vendor Advisory () http://www.vupen.com/english/advisories/2010/1432 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2010/1434 - Vendor Advisory () http://www.vupen.com/english/advisories/2010/1434 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2010/1453 - Vendor Advisory () http://www.vupen.com/english/advisories/2010/1453 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2010/1482 - Vendor Advisory () http://www.vupen.com/english/advisories/2010/1482 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2010/1522 - Vendor Advisory () http://www.vupen.com/english/advisories/2010/1522 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2010/1793 - Vendor Advisory () http://www.vupen.com/english/advisories/2010/1793 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2011/0192 - Vendor Advisory () http://www.vupen.com/english/advisories/2011/0192 - Vendor Advisory
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15798 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15798 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6765 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6765 -

Information

Published : 2010-06-15 18:00

Updated : 2024-11-21 01:16


NVD link : CVE-2010-2164

Mitre link : CVE-2010-2164

CVE.ORG link : CVE-2010-2164


JSON object : View

Products Affected

adobe

  • air
  • flash_player

macromedia

  • flash_player
CWE
CWE-399

Resource Management Errors