ID

VAR-201004-0304


CVE

CVE-2010-1241


TITLE

Adobe Reader and Acrobat of custom heap management system Heap-based buffer overflow vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2010-001360

DESCRIPTION

Heap-based buffer overflow in the custom heap management system in Adobe Reader and Acrobat 9.x before 9.3.2, and 8.x before 8.2.2 on Windows and Mac OS X, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted PDF document, aka FG-VD-10-005. Adobe Acrobat and Reader are prone to a remote code-execution vulnerability. An attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition. The following products are affected: Adobe Reader 9.3.1 and prior for Windows, Macintosh, and UNIX Adobe Acrobat 9.3.1 and prior for Windows and Macintosh Adobe Reader 8.2.1 and prior for Windows and Macintosh Acrobat 8.2.1 and prior for Windows and Macintosh NOTE: This issue was originally documented in BID 39329 (Adobe Acrobat and Reader April 2010 Multiple Remote Vulnerabilities); it has been assigned its own BID to better document the vulnerability. Impact: Remote Code Execution. Risk: High. The vulnerable X3D component is a plugin used to display 3D material, which when present in a PDF document, can lead to exploitation (CVE-2010-0194). * Memory corruption through heap overflow in "CoolType.dll" (CVE-2010-1241). The vulnerabilities are triggered when opening and rendering a PDF document. A remote attacker could craft a malicious document which exploits either one of these vulnerabilities, allowing them to compromise a system. FortiGuard Labs released the following signatures to protect against these vulnerabilities * "Adobe.Reader.DeviceRGB.Subtype.Stream.Memory.Corruption", previously released as "FG-VD-10-003-Adobe" (CVE-2010-0194). * "Adobe.Reader.Acrobat.Pro.CFF.Encodings.Handling.Heap.Overflow", previously released as "FG-VD-10-005-Adobe" (CVE-2010-1241). References: * Adobe Security Bulletin: http://www.adobe.com/support/security/bulletins/apsb10-09.html * CVE ID: CVE-2010-0194 * CVE ID: CVE-2010-1241 Acknowledgment: * Bing Liu of Fortinet's FortiGuard Labs (CVE-2010-0194) * Haifei Li of Fortinet's FortiGuard Labs (CVE-2010-1241) . I. These vulnerabilities affect Reader and Acrobat 9.3.1 and earlier 9.x versions, and 8.2.1 and earlier versions. An attacker could exploit these vulnerabilities by convincing a user to open a specially crafted PDF file. The Adobe Reader browser plug-in is available for multiple web browsers and operating systems, which can automatically open PDF documents hosted on a website. II. III. For a fresh installation, first install Adobe Reader 9.3.0 or 8.2.0 and then use the automatic update feature or install the appropriate update referenced in APSB10-09. Acrobat JavaScript can be disabled using the Preferences menu (Edit -> Preferences -> JavaScript; uncheck Enable Acrobat JavaScript). Adobe provides a framework to blacklist specific JavaScipt APIs. If JavaScript must be enabled, this feature may be useful when specific APIs are known to be vulnerable or used in attacks. Prevent Internet Explorer from automatically opening PDF documents The installer for Adobe Reader and Acrobat configures Internet Explorer to automatically open PDF files without any user interaction. This behavior can be reverted to a safer option that prompts the user by importing the following as a .REG file: Windows Registry Editor Version 5.00 [HKEY_CLASSES_ROOT\AcroExch.Document.7] "EditFlags"=hex:00,00,00,00 Disable the display of PDF documents in the web browser Preventing PDF documents from opening inside a web browser will partially mitigate this vulnerability. If this workaround is applied, it may also mitigate future vulnerabilities. To prevent PDF documents from automatically being opened in a web browser, do the following: 1. 2. Open the Edit menu. 3. Choose the Preferences option. 4. Choose the Internet section. 5. Uncheck the "Display PDF in browser" checkbox. Do not access PDF documents from untrusted sources Do not open unfamiliar or unexpected PDF documents, particularly those hosted on websites or delivered as email attachments. Please see Cyber Security Tip ST04-010. IV. Please send email to <cert@cert.org> with "TA10-103C Feedback VU#352598" in the subject. ____________________________________________________________________ For instructions on subscribing to or unsubscribing from this mailing list, visit <http://www.us-cert.gov/cas/signup.html>. ____________________________________________________________________ Produced 2010 by US-CERT, a government organization. Terms of use: <http://www.us-cert.gov/legal.html> ____________________________________________________________________ Revision History April 13, 2010: Initial release -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.5 (GNU/Linux) iQEVAwUBS8TuRj6pPKYJORa3AQJfzggAj8p3s/TrJT16ceFtRzLR31QBgRq6GxYr h8WnsGlj2WR71XjH219XaWx9Mj3KBWVxbAsNPmK0tEir7KA+n4DwZCewTDYRqfYs 8N7G9MOI68Z87+7zBiZAo0j5/lQuxLWyTF9PqWbX8gCWLqJWW46cEZCqg7OGRbYt w8coxdMXU6tM3WGoWAIKwLRtpQUdubcITPTrE7RATyLJ1422B9dkTSeSCuHHZs5d eXSPYzTQ1EOwHpuA5/a/or2SjeRPLQcpxb/8WKelSqwW3hpK4zviEnPt4cYyeNqW BQY06OQMTKch/nmniuEDuiwe69m0gTw7Tw2Dm6xrg6BLBy3A6GAwkQ== =CQ6i -----END PGP SIGNATURE----- . - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201009-05 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: Adobe Reader: Multiple vulnerabilities Date: September 07, 2010 Bugs: #297385, #306429, #313343, #322857 ID: 201009-05 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities in Adobe Reader might result in the execution of arbitrary code or other attacks. Workaround ========== There is no known workaround at this time. Resolution ========== All Adobe Reader users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=app-text/acroread-9.3.4" References ========== [ 1 ] APSA10-01 http://www.adobe.com/support/security/advisories/apsa10-01.html [ 2 ] APSB10-02 http://www.adobe.com/support/security/bulletins/apsb10-02.html [ 3 ] APSB10-07 http://www.adobe.com/support/security/bulletins/apsb10-07.html [ 4 ] APSB10-09 http://www.adobe.com/support/security/bulletins/apsb10-09.html [ 5 ] APSB10-14 http://www.adobe.com/support/security/bulletins/apsb10-14.html [ 6 ] APSB10-16 http://www.adobe.com/support/security/bulletins/apsb10-16.html [ 7 ] CVE-2009-3953 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3953 [ 8 ] CVE-2009-4324 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4324 [ 9 ] CVE-2010-0186 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0186 [ 10 ] CVE-2010-0188 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0188 [ 11 ] CVE-2010-0190 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0190 [ 12 ] CVE-2010-0191 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0191 [ 13 ] CVE-2010-0192 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0192 [ 14 ] CVE-2010-0193 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0193 [ 15 ] CVE-2010-0194 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0194 [ 16 ] CVE-2010-0195 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0195 [ 17 ] CVE-2010-0196 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0196 [ 18 ] CVE-2010-0197 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0197 [ 19 ] CVE-2010-0198 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0198 [ 20 ] CVE-2010-0199 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0199 [ 21 ] CVE-2010-0201 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0201 [ 22 ] CVE-2010-0202 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0202 [ 23 ] CVE-2010-0203 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0203 [ 24 ] CVE-2010-0204 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0204 [ 25 ] CVE-2010-1241 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1241 [ 26 ] CVE-2010-1285 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1285 [ 27 ] CVE-2010-1295 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1295 [ 28 ] CVE-2010-1297 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1297 [ 29 ] CVE-2010-2168 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2168 [ 30 ] CVE-2010-2201 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2201 [ 31 ] CVE-2010-2202 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2202 [ 32 ] CVE-2010-2203 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2203 [ 33 ] CVE-2010-2204 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2204 [ 34 ] CVE-2010-2205 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2205 [ 35 ] CVE-2010-2206 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2206 [ 36 ] CVE-2010-2207 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2207 [ 37 ] CVE-2010-2208 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2208 [ 38 ] CVE-2010-2209 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2209 [ 39 ] CVE-2010-2210 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2210 [ 40 ] CVE-2010-2211 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2211 [ 41 ] CVE-2010-2212 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2212 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-201009-05.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2010 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5

Trust: 2.61

sources: NVD: CVE-2010-1241 // JVNDB: JVNDB-2010-001360 // BID: 39470 // BID: 39329 // VULHUB: VHN-43846 // VULMON: CVE-2010-1241 // PACKETSTORM: 88347 // PACKETSTORM: 88345 // PACKETSTORM: 93607

AFFECTED PRODUCTS

vendor:adobemodel:acrobat readerscope:eqversion:8.1.7

Trust: 1.6

vendor:adobemodel:acrobat readerscope:eqversion:8.1.1

Trust: 1.6

vendor:adobemodel:acrobat readerscope:eqversion:8.1.6

Trust: 1.6

vendor:adobemodel:acrobat readerscope:eqversion:8.1.5

Trust: 1.6

vendor:adobemodel:acrobat readerscope:eqversion:8.2.1

Trust: 1.6

vendor:adobemodel:acrobat readerscope:eqversion:8.2

Trust: 1.6

vendor:adobemodel:acrobat readerscope:eqversion:8.1.2

Trust: 1.6

vendor:adobemodel:acrobat readerscope:eqversion:8.1

Trust: 1.6

vendor:adobemodel:acrobat readerscope:eqversion:8.1.4

Trust: 1.6

vendor:adobemodel:acrobat readerscope:eqversion:8.0

Trust: 1.6

vendor:adobemodel:acrobat readerscope:eqversion:9.1.2

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:9.1.3

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:9.3

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:9.1

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:9.2

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:9.0

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:9.1.1

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:9.3.1

Trust: 1.0

vendor:adobemodel:acrobatscope:ltversion:8.2.2

Trust: 0.8

vendor:adobemodel:acrobatscope:ltversion:9.3.2

Trust: 0.8

vendor:adobemodel:readerscope:ltversion:8.2.2

Trust: 0.8

vendor:adobemodel:readerscope:ltversion:9.3.2

Trust: 0.8

vendor:red hatmodel:enterprise linux extrasscope:eqversion:4 extras

Trust: 0.8

vendor:red hatmodel:enterprise linux extrasscope:eqversion:4.8.z extras

Trust: 0.8

vendor:red hatmodel:rhel desktop supplementaryscope:eqversion:5 (client)

Trust: 0.8

vendor:red hatmodel:rhel supplementaryscope:eqversion:5 (server)

Trust: 0.8

vendor:red hatmodel:rhel supplementary eusscope:eqversion:5.4.z (server)

Trust: 0.8

vendor:redhatmodel:enterprise linux ws extrasscope:eqversion:4

Trust: 0.6

vendor:redhatmodel:enterprise linux supplementary serverscope:eqversion:5

Trust: 0.6

vendor:redhatmodel:enterprise linux extrasscope:eqversion:4

Trust: 0.6

vendor:redhatmodel:enterprise linux es extrasscope:eqversion:4

Trust: 0.6

vendor:redhatmodel:enterprise linux desktop supplementary clientscope:eqversion:5

Trust: 0.6

vendor:redhatmodel:enterprise linux as extrasscope:eqversion:4

Trust: 0.6

vendor:redhatmodel:desktop extrasscope:eqversion:4

Trust: 0.6

vendor:adobemodel:readerscope:eqversion:9.3.1

Trust: 0.6

vendor:adobemodel:readerscope:eqversion:9.1.3

Trust: 0.6

vendor:adobemodel:readerscope:eqversion:9.1.2

Trust: 0.6

vendor:adobemodel:readerscope:eqversion:9.1.1

Trust: 0.6

vendor:adobemodel:readerscope:eqversion:8.2.1

Trust: 0.6

vendor:adobemodel:readerscope:eqversion:8.1.7

Trust: 0.6

vendor:adobemodel:readerscope:eqversion:8.1.6

Trust: 0.6

vendor:adobemodel:readerscope:eqversion:8.1.5

Trust: 0.6

vendor:adobemodel:readerscope:eqversion:8.1.4

Trust: 0.6

vendor:adobemodel:readerscope:eqversion:8.1.3

Trust: 0.6

vendor:adobemodel:readerscope:eqversion:8.1.2

Trust: 0.6

vendor:adobemodel:readerscope:eqversion:8.1.1

Trust: 0.6

vendor:adobemodel:readerscope:eqversion:9.3

Trust: 0.6

vendor:adobemodel:readerscope:eqversion:9.2

Trust: 0.6

vendor:adobemodel:readerscope:eqversion:9.1

Trust: 0.6

vendor:adobemodel:readerscope:eqversion:9.0

Trust: 0.6

vendor:adobemodel:readerscope:eqversion:8.2

Trust: 0.6

vendor:adobemodel:reader security updatscope:eqversion:8.1.2

Trust: 0.6

vendor:adobemodel:readerscope:eqversion:8.1

Trust: 0.6

vendor:adobemodel:readerscope:eqversion:8.0

Trust: 0.6

vendor:adobemodel:acrobat standardscope:eqversion:9.3.1

Trust: 0.6

vendor:adobemodel:acrobat standardscope:eqversion:9.1.3

Trust: 0.6

vendor:adobemodel:acrobat standardscope:eqversion:9.1.2

Trust: 0.6

vendor:adobemodel:acrobat standardscope:eqversion:8.2.1

Trust: 0.6

vendor:adobemodel:acrobat standardscope:eqversion:8.1.7

Trust: 0.6

vendor:adobemodel:acrobat standardscope:eqversion:8.1.6

Trust: 0.6

vendor:adobemodel:acrobat standardscope:eqversion:8.1.4

Trust: 0.6

vendor:adobemodel:acrobat standardscope:eqversion:8.1.3

Trust: 0.6

vendor:adobemodel:acrobat standardscope:eqversion:8.1.2

Trust: 0.6

vendor:adobemodel:acrobat standardscope:eqversion:8.1.1

Trust: 0.6

vendor:adobemodel:acrobat standardscope:eqversion:9.3

Trust: 0.6

vendor:adobemodel:acrobat standardscope:eqversion:9.2

Trust: 0.6

vendor:adobemodel:acrobat standardscope:eqversion:9.1

Trust: 0.6

vendor:adobemodel:acrobat standardscope:eqversion:9

Trust: 0.6

vendor:adobemodel:acrobat standardscope:eqversion:8.2

Trust: 0.6

vendor:adobemodel:acrobat standardscope:eqversion:8.1

Trust: 0.6

vendor:adobemodel:acrobat standardscope:eqversion:8.0

Trust: 0.6

vendor:adobemodel:acrobat professionalscope:eqversion:9.3.1

Trust: 0.6

vendor:adobemodel:acrobat professionalscope:eqversion:8.2.1

Trust: 0.6

vendor:adobemodel:acrobat professionalscope:eqversion:8.1.7

Trust: 0.6

vendor:adobemodel:acrobat professionalscope:eqversion:8.1.6

Trust: 0.6

vendor:adobemodel:acrobat professionalscope:eqversion:8.1.4

Trust: 0.6

vendor:adobemodel:acrobat professionalscope:eqversion:8.1.3

Trust: 0.6

vendor:adobemodel:acrobat professionalscope:eqversion:8.1.2

Trust: 0.6

vendor:adobemodel:acrobat professionalscope:eqversion:8.1.1

Trust: 0.6

vendor:adobemodel:acrobat professionalscope:eqversion:9.3

Trust: 0.6

vendor:adobemodel:acrobat professionalscope:eqversion:8.2

Trust: 0.6

vendor:adobemodel:acrobat professional security updatscope:eqversion:8.1.2

Trust: 0.6

vendor:adobemodel:acrobat professionalscope:eqversion:8.1

Trust: 0.6

vendor:adobemodel:acrobatscope:eqversion:9.3.1

Trust: 0.6

vendor:adobemodel:acrobatscope:eqversion:9.1.1

Trust: 0.6

vendor:adobemodel:acrobatscope:eqversion:9.3

Trust: 0.6

vendor:adobemodel:acrobatscope:eqversion:9.2

Trust: 0.6

vendor:adobemodel:readerscope:neversion:9.3.2

Trust: 0.6

vendor:adobemodel:readerscope:neversion:8.2.2

Trust: 0.6

vendor:adobemodel:acrobat standardscope:neversion:9.3.2

Trust: 0.6

vendor:adobemodel:acrobat standardscope:neversion:8.2.2

Trust: 0.6

vendor:adobemodel:acrobat professionalscope:neversion:9.3.2

Trust: 0.6

vendor:adobemodel:acrobat professionalscope:neversion:8.2.2

Trust: 0.6

vendor:adobemodel:acrobatscope:neversion:9.3.2

Trust: 0.6

vendor:adobemodel:acrobatscope:neversion:8.2.2

Trust: 0.6

vendor:susemodel:linux enterprise desktopscope:eqversion:11

Trust: 0.3

vendor:susemodel:linux enterprise desktop sp3scope:eqversion:10

Trust: 0.3

vendor:susemodel:linux enterprise desktop sp2scope:eqversion:10

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:11.2

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:11.1

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:11.0

Trust: 0.3

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:9.1.3

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:9.1.2

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:9.2

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:9.1

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:9

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:8.0

Trust: 0.3

sources: BID: 39470 // BID: 39329 // JVNDB: JVNDB-2010-001360 // CNNVD: CNNVD-201004-079 // NVD: CVE-2010-1241

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2010-1241
value: HIGH

Trust: 1.0

NVD: CVE-2010-1241
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201004-079
value: CRITICAL

Trust: 0.6

VULHUB: VHN-43846
value: HIGH

Trust: 0.1

VULMON: CVE-2010-1241
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2010-1241
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-43846
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-43846 // VULMON: CVE-2010-1241 // JVNDB: JVNDB-2010-001360 // CNNVD: CNNVD-201004-079 // NVD: CVE-2010-1241

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-43846 // JVNDB: JVNDB-2010-001360 // NVD: CVE-2010-1241

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 88347 // CNNVD: CNNVD-201004-079

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-201004-079

CONFIGURATIONS

sources: JVNDB: JVNDB-2010-001360

PATCH

title:APSB10-09url:http://www.adobe.com/support/security/bulletins/apsb10-09.html

Trust: 0.8

title:APSB10-09url:http://www.adobe.com/jp/support/security/bulletins/apsb10-09.html

Trust: 0.8

title:RHSA-2010:0349url:https://rhn.redhat.com/errata/RHSA-2010-0349.html

Trust: 0.8

title:TA10-103Curl:http://software.fujitsu.com/jp/security/vulnerabilities/ta10-103c.html

Trust: 0.8

title:Adobe Reader 9.3.2 update (Intel) - multiple languagesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=4092

Trust: 0.6

title:Adobe Reader 8.1.7url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=4096

Trust: 0.6

title:Adobe Acrobat 9.3.2 Pro update - multiple languagesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=4100

Trust: 0.6

title:Adobe Reader 9.3.2 update - multiple languagesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=4091

Trust: 0.6

title:Adobe Reader 8.1.7url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=4095

Trust: 0.6

title:Red Hat: Critical: acroread security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20100349 - Security Advisory

Trust: 0.1

title: - url:https://github.com/0xCyberY/CVE-T4PDF

Trust: 0.1

title:welivesecurityurl:https://www.welivesecurity.com/2010/05/06/fake-adobe-updates/

Trust: 0.1

sources: VULMON: CVE-2010-1241 // JVNDB: JVNDB-2010-001360 // CNNVD: CNNVD-201004-079

EXTERNAL IDS

db:NVDid:CVE-2010-1241

Trust: 3.1

db:USCERTid:TA10-103C

Trust: 2.1

db:VUPENid:ADV-2010-0873

Trust: 2.0

db:BIDid:39329

Trust: 1.5

db:BIDid:39470

Trust: 1.3

db:BIDid:39227

Trust: 1.2

db:USCERTid:SA10-103C

Trust: 0.8

db:JVNDBid:JVNDB-2010-001360

Trust: 0.8

db:CNNVDid:CNNVD-201004-079

Trust: 0.7

db:MLISTid:[DAILYDAVE] 20100401 0DAY, IT MAY NOT BE

Trust: 0.6

db:VULHUBid:VHN-43846

Trust: 0.1

db:VULMONid:CVE-2010-1241

Trust: 0.1

db:PACKETSTORMid:88347

Trust: 0.1

db:PACKETSTORMid:88345

Trust: 0.1

db:PACKETSTORMid:93607

Trust: 0.1

sources: VULHUB: VHN-43846 // VULMON: CVE-2010-1241 // BID: 39470 // BID: 39329 // JVNDB: JVNDB-2010-001360 // PACKETSTORM: 88347 // PACKETSTORM: 88345 // PACKETSTORM: 93607 // CNNVD: CNNVD-201004-079 // NVD: CVE-2010-1241

REFERENCES

url:http://www.us-cert.gov/cas/techalerts/ta10-103c.html

Trust: 2.0

url:http://www.adobe.com/support/security/bulletins/apsb10-09.html

Trust: 2.0

url:http://www.vupen.com/english/advisories/2010/0873

Trust: 2.0

url:http://blog.fortinet.com/the-upcoming-blackhat-europe-2010-presentation/

Trust: 1.8

url:http://www.blackhat.com/html/bh-eu-10/bh-eu-10-briefings.html#li

Trust: 1.8

url:http://lists.immunitysec.com/pipermail/dailydave/2010-april/006077.html

Trust: 1.8

url:http://www.securityfocus.com/bid/39227

Trust: 1.2

url:http://www.securityfocus.com/bid/39329

Trust: 1.2

url:http://www.youtube.com/watch?v=9evhty1-0q8

Trust: 1.2

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a6940

Trust: 1.2

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/57589

Trust: 1.2

url:http://www.securityfocus.com/bid/39470

Trust: 0.9

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-1241

Trust: 0.9

url:https://www.jpcert.or.jp/at/2010/at100009.txt

Trust: 0.8

url:http://jvn.jp/cert/jvnta10-103c/

Trust: 0.8

url:http://jvn.jp/tr/jvntr-2010-13/

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-1241

Trust: 0.8

url:http://www.us-cert.gov/cas/alerts/sa10-103c.html

Trust: 0.8

url:http://www.npa.go.jp/cyberpolice/index.html#topics

Trust: 0.8

url:http://www.adobe.com

Trust: 0.6

url:http://www.fortiguard.com/advisory/fga-2010-18.html

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2010-0194

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/119.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2010:0349

Trust: 0.1

url:https://www.welivesecurity.com/2010/05/06/fake-adobe-updates/

Trust: 0.1

url:https://www.symantec.com/content/symantec/english/en/security-center/vulnerabilities/writeup.html/39470

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-1241

Trust: 0.1

url:http://www.us-cert.gov/cas/techalerts/ta10-103c.html>

Trust: 0.1

url:http://kb2.adobe.com/cps/504/cpsid_50431.html>

Trust: 0.1

url:http://blogs.adobe.com/adobereader/2010/04/upcoming_adobe_reader_and_acro.html>

Trust: 0.1

url:http://www.adobe.com/support/security/bulletins/apsb10-09.html>

Trust: 0.1

url:http://www.us-cert.gov/cas/signup.html>.

Trust: 0.1

url:http://www.us-cert.gov/legal.html>

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2203

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-4324

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2209

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-0188

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-0202

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0194

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-0199

Trust: 0.1

url:http://security.gentoo.org/glsa/glsa-201009-05.xml

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2202

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2205

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2206

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-0203

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0197

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2211

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-1285

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2204

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0199

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-0192

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0186

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0190

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-0196

Trust: 0.1

url:http://www.adobe.com/support/security/bulletins/apsb10-14.html

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-3953

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-4324

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0191

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0202

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0204

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-0201

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2210

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-0197

Trust: 0.1

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0188

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0198

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-0191

Trust: 0.1

url:http://www.adobe.com/support/security/bulletins/apsb10-07.html

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-1297

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-1295

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0192

Trust: 0.1

url:http://security.gentoo.org/

Trust: 0.1

url:http://www.adobe.com/support/security/advisories/apsa10-01.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-3953

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0203

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2208

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-0190

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0193

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-0198

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2207

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0195

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-0204

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2168

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0201

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0196

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2201

Trust: 0.1

url:http://www.adobe.com/support/security/bulletins/apsb10-02.html

Trust: 0.1

url:http://www.adobe.com/support/security/bulletins/apsb10-16.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-0193

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-0186

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-0195

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2212

Trust: 0.1

sources: VULHUB: VHN-43846 // VULMON: CVE-2010-1241 // BID: 39470 // BID: 39329 // JVNDB: JVNDB-2010-001360 // PACKETSTORM: 88347 // PACKETSTORM: 88345 // PACKETSTORM: 93607 // CNNVD: CNNVD-201004-079 // NVD: CVE-2010-1241

CREDITS

Haifei Li of Fortinet's FortiGuard Labs

Trust: 0.3

sources: BID: 39470

SOURCES

db:VULHUBid:VHN-43846
db:VULMONid:CVE-2010-1241
db:BIDid:39470
db:BIDid:39329
db:JVNDBid:JVNDB-2010-001360
db:PACKETSTORMid:88347
db:PACKETSTORMid:88345
db:PACKETSTORMid:93607
db:CNNVDid:CNNVD-201004-079
db:NVDid:CVE-2010-1241

LAST UPDATE DATE

2024-11-23T19:52:03.741000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-43846date:2017-09-19T00:00:00
db:VULMONid:CVE-2010-1241date:2017-09-19T00:00:00
db:BIDid:39470date:2010-09-07T21:12:00
db:BIDid:39329date:2010-04-16T15:53:00
db:JVNDBid:JVNDB-2010-001360date:2010-04-30T00:00:00
db:CNNVDid:CNNVD-201004-079date:2011-07-13T00:00:00
db:NVDid:CVE-2010-1241date:2024-11-21T01:13:57.480

SOURCES RELEASE DATE

db:VULHUBid:VHN-43846date:2010-04-05T00:00:00
db:VULMONid:CVE-2010-1241date:2010-04-05T00:00:00
db:BIDid:39470date:2010-04-13T00:00:00
db:BIDid:39329date:2010-04-08T00:00:00
db:JVNDBid:JVNDB-2010-001360date:2010-04-30T00:00:00
db:PACKETSTORMid:88347date:2010-04-14T07:07:17
db:PACKETSTORMid:88345date:2010-04-14T07:04:22
db:PACKETSTORMid:93607date:2010-09-08T05:23:46
db:CNNVDid:CNNVD-201004-079date:2010-04-05T00:00:00
db:NVDid:CVE-2010-1241date:2010-04-05T15:30:01.343