Stack-based buffer overflow in CoolType.dll in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a PDF document with a long field in a Smart INdependent Glyphlets (SING) table in a TTF font, as exploited in the wild in September 2010. NOTE: some of these details are obtained from third party information.
References
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
History
21 Nov 2024, 01:17
Type | Values Removed | Values Added |
---|---|---|
References | () http://blog.metasploit.com/2010/09/return-of-unpublished-adobe.html - Broken Link | |
References | () http://community.websense.com/blogs/securitylabs/archive/2010/09/10/brief-analysis-on-adobe-reader-sing-table-parsing-vulnerability-cve-2010-2883.aspx - Broken Link | |
References | () http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00001.html - Broken Link | |
References | () http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html - Broken Link | |
References | () http://secunia.com/advisories/41340 - Broken Link, Vendor Advisory | |
References | () http://secunia.com/advisories/43025 - Broken Link, Vendor Advisory | |
References | () http://security.gentoo.org/glsa/glsa-201101-08.xml - Third Party Advisory | |
References | () http://www.adobe.com/support/security/advisories/apsa10-02.html - Vendor Advisory | |
References | () http://www.adobe.com/support/security/bulletins/apsb10-21.html - Vendor Advisory | |
References | () http://www.kb.cert.org/vuls/id/491991 - Third Party Advisory, US Government Resource | |
References | () http://www.redhat.com/support/errata/RHSA-2010-0743.html - Broken Link | |
References | () http://www.securityfocus.com/bid/43057 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.turbolinux.co.jp/security/2011/TLSA-2011-2j.txt - Broken Link | |
References | () http://www.us-cert.gov/cas/techalerts/TA10-279A.html - Third Party Advisory, US Government Resource | |
References | () http://www.vupen.com/english/advisories/2010/2331 - Broken Link, Vendor Advisory | |
References | () http://www.vupen.com/english/advisories/2011/0191 - Broken Link, Vendor Advisory | |
References | () http://www.vupen.com/english/advisories/2011/0344 - Broken Link, Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/61635 - Third Party Advisory, VDB Entry | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11586 - Broken Link |
28 Jun 2024, 14:16
Type | Values Removed | Values Added |
---|---|---|
References | () http://blog.metasploit.com/2010/09/return-of-unpublished-adobe.html - Broken Link | |
References | () http://community.websense.com/blogs/securitylabs/archive/2010/09/10/brief-analysis-on-adobe-reader-sing-table-parsing-vulnerability-cve-2010-2883.aspx - Broken Link | |
References | () http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00001.html - Broken Link | |
References | () http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html - Broken Link | |
References | () http://secunia.com/advisories/41340 - Broken Link, Vendor Advisory | |
References | () http://secunia.com/advisories/43025 - Broken Link, Vendor Advisory | |
References | () http://security.gentoo.org/glsa/glsa-201101-08.xml - Third Party Advisory | |
References | () http://www.adobe.com/support/security/bulletins/apsb10-21.html - Vendor Advisory | |
References | () http://www.kb.cert.org/vuls/id/491991 - Third Party Advisory, US Government Resource | |
References | () http://www.redhat.com/support/errata/RHSA-2010-0743.html - Broken Link | |
References | () http://www.securityfocus.com/bid/43057 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.turbolinux.co.jp/security/2011/TLSA-2011-2j.txt - Broken Link | |
References | () http://www.us-cert.gov/cas/techalerts/TA10-279A.html - Third Party Advisory, US Government Resource | |
References | () http://www.vupen.com/english/advisories/2010/2331 - Broken Link, Vendor Advisory | |
References | () http://www.vupen.com/english/advisories/2011/0191 - Broken Link, Vendor Advisory | |
References | () http://www.vupen.com/english/advisories/2011/0344 - Broken Link, Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/61635 - Third Party Advisory, VDB Entry | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11586 - Broken Link | |
First Time |
Apple macos
|
|
CWE | CWE-787 | |
CVSS |
v2 : v3 : |
v2 : 9.3
v3 : 7.3 |
CPE | cpe:2.3:a:adobe:acrobat:8.2.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:8.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:8.1.7:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:8.1.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:8.1.5:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:8.1.7:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:8.2.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:8.2.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.3.2:*:*:*:*:*:*:* cpe:2.3:a:apple:mac_os_x:*:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.1.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:8.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:8.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:8.1.6:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.3.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:8.2.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.3.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:8.1.2:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.3.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.1.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:8.1.4:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:8.1.4:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:8.1.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:8.1.6:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:8.2.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.3.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:8.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:8.1.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:8.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:8.1.5:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.3.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:8.2.4:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:8.2.4:*:*:*:*:*:*:* |
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:* |
Information
Published : 2010-09-09 22:00
Updated : 2024-11-21 01:17
NVD link : CVE-2010-2883
Mitre link : CVE-2010-2883
CVE.ORG link : CVE-2010-2883
JSON object : View
Products Affected
apple
- macos
microsoft
- windows
adobe
- acrobat
- acrobat_reader
CWE
CWE-787
Out-of-bounds Write