CVE-2010-3976

Untrusted search path vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse dwmapi.dll that is located in the same folder as a file that is processed by Flash Player.
References
Link Resource
http://core.yehg.net/lab/pr0js/advisories/dll_hijacking/%5Bflash_player%5D_10.1.x_insecure_dll_hijacking_%28dwmapi.dll%29
http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html Vendor Advisory
http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00002.html
http://marc.info/?l=bugtraq&m=130331642631603&w=2
http://marc.info/?l=bugtraq&m=130331642631603&w=2
http://secunia.com/advisories/43026 Vendor Advisory
http://security.gentoo.org/glsa/glsa-201101-09.xml
http://support.apple.com/kb/HT4435 Vendor Advisory
http://www.acrossecurity.com/aspr/ASPR-2010-11-05-1-PUB.txt
http://www.adobe.com/support/security/bulletins/apsb10-26.html Vendor Advisory
http://www.derkeiler.com/Mailing-Lists/securityfocus/bugtraq/2010-09/msg00070.html Exploit
http://www.securityfocus.com/archive/1/514653/100/0/threaded
http://www.securityfocus.com/bid/44671
http://www.vupen.com/english/advisories/2010/2903 Vendor Advisory
http://www.vupen.com/english/advisories/2011/0192 Vendor Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6926
http://core.yehg.net/lab/pr0js/advisories/dll_hijacking/%5Bflash_player%5D_10.1.x_insecure_dll_hijacking_%28dwmapi.dll%29
http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html Vendor Advisory
http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00002.html
http://marc.info/?l=bugtraq&m=130331642631603&w=2
http://marc.info/?l=bugtraq&m=130331642631603&w=2
http://secunia.com/advisories/43026 Vendor Advisory
http://security.gentoo.org/glsa/glsa-201101-09.xml
http://support.apple.com/kb/HT4435 Vendor Advisory
http://www.acrossecurity.com/aspr/ASPR-2010-11-05-1-PUB.txt
http://www.adobe.com/support/security/bulletins/apsb10-26.html Vendor Advisory
http://www.derkeiler.com/Mailing-Lists/securityfocus/bugtraq/2010-09/msg00070.html Exploit
http://www.securityfocus.com/archive/1/514653/100/0/threaded
http://www.securityfocus.com/bid/44671
http://www.vupen.com/english/advisories/2010/2903 Vendor Advisory
http://www.vupen.com/english/advisories/2011/0192 Vendor Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6926
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.124.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.125.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.151.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.152.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.155.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.159.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.246.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.260.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.262.0:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
OR cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:10.0.0.584:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:10.0.12.10:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:10.0.12.36:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:10.0.15.3:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:10.0.22.87:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:10.0.32.18:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:10.0.42.34:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:10.0.45.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:10.1.52.14.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:10.1.52.15:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:10.1.53.64:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:10.1.82.76:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:10.1.92.8:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:10.1.95.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:10.1.95.2:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*

History

21 Nov 2024, 01:19

Type Values Removed Values Added
References () http://core.yehg.net/lab/pr0js/advisories/dll_hijacking/%5Bflash_player%5D_10.1.x_insecure_dll_hijacking_%28dwmapi.dll%29 - () http://core.yehg.net/lab/pr0js/advisories/dll_hijacking/%5Bflash_player%5D_10.1.x_insecure_dll_hijacking_%28dwmapi.dll%29 -
References () http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html - Vendor Advisory () http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html - Vendor Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00002.html - () http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00002.html -
References () http://marc.info/?l=bugtraq&m=130331642631603&w=2 - () http://marc.info/?l=bugtraq&m=130331642631603&w=2 -
References () http://secunia.com/advisories/43026 - Vendor Advisory () http://secunia.com/advisories/43026 - Vendor Advisory
References () http://security.gentoo.org/glsa/glsa-201101-09.xml - () http://security.gentoo.org/glsa/glsa-201101-09.xml -
References () http://support.apple.com/kb/HT4435 - Vendor Advisory () http://support.apple.com/kb/HT4435 - Vendor Advisory
References () http://www.acrossecurity.com/aspr/ASPR-2010-11-05-1-PUB.txt - () http://www.acrossecurity.com/aspr/ASPR-2010-11-05-1-PUB.txt -
References () http://www.adobe.com/support/security/bulletins/apsb10-26.html - Vendor Advisory () http://www.adobe.com/support/security/bulletins/apsb10-26.html - Vendor Advisory
References () http://www.derkeiler.com/Mailing-Lists/securityfocus/bugtraq/2010-09/msg00070.html - Exploit () http://www.derkeiler.com/Mailing-Lists/securityfocus/bugtraq/2010-09/msg00070.html - Exploit
References () http://www.securityfocus.com/archive/1/514653/100/0/threaded - () http://www.securityfocus.com/archive/1/514653/100/0/threaded -
References () http://www.securityfocus.com/bid/44671 - () http://www.securityfocus.com/bid/44671 -
References () http://www.vupen.com/english/advisories/2010/2903 - Vendor Advisory () http://www.vupen.com/english/advisories/2010/2903 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2011/0192 - Vendor Advisory () http://www.vupen.com/english/advisories/2011/0192 - Vendor Advisory
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6926 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6926 -

Information

Published : 2010-10-19 21:00

Updated : 2024-11-21 01:19


NVD link : CVE-2010-3976

Mitre link : CVE-2010-3976

CVE.ORG link : CVE-2010-3976


JSON object : View

Products Affected

adobe

  • flash_player

microsoft

  • windows