ID

VAR-201005-0052


CVE

CVE-2010-0129


TITLE

Adobe Shockwave Player Integer overflow vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2010-001475

DESCRIPTION

Multiple integer overflows in Adobe Shockwave Player before 11.5.7.609 allow remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted .dir (aka Director) file that triggers an array index error. Adobe Shockwave Player is prone to multiple remote code-execution vulnerabilities while parsing Director (.dir) files. Attackers can exploit these issues to execute arbitrary code in the context of the currently logged-in user. Failed exploit attempts may cause a denial-of-service condition. Versions prior to Shockwave Player 11.5.7.609 are vulnerable. Note: These issues were previously covered in BID 40066 (Adobe Shockwave Player APSB10-12 Multiple Remote Vulnerabilities); they have been given their own record to better document them. The vulnerable software fails to sanitize user input when processing .dir files resulting in a crash and overwrite of a few memory registers.<br/><br/> --------------------------------------------------------------------------------<br/><br/><code> (f94.ae4): Access violation - code c0000005 (first chance)<br/> First chance exceptions are reported before any exception handling.<br/> This exception may be expected and handled.<br/> eax=20a0a0a0 ebx=207d004c ecx=00000400 edx=41414140 esi=00000000 edi=a80487d8<br/> eip=68008bd6 esp=0012de4c ebp=00000400 iopl=0 nv up ei pl nz na pe nc<br/> cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00050206<br/> *** WARNING: Unable to verify checksum for C:\Program Files\Adobe\Adobe Director 11\DIRAPI.dll<br/> *** ERROR: Symbol file could not be found. Defaulted to export symbols for DIRAPI.dll - <br/> DIRAPI!Ordinal14+0x3b16:<br/> 68008bd6 2b4f04 sub ecx,dword ptr [edi+4] ds:0023:a80487dc=????????<br/><br/>-----------------------<br/><br/>EAX FFFFFFFF<br/>ECX 41414141<br/>EDX FFFFFFFF<br/>EBX 00000018<br/>ESP 0012F3B4<br/>EBP 02793578<br/>ESI 0012F3C4<br/>EDI 02793578<br/>EIP 69009F1F IML32.69009F1F<br/></code><br/>--------------------------------------------------------------------------------<br/><br/>Tested on: Microsoft Windows XP Professional SP3 (English). ---------------------------------------------------------------------- Looking for a job? Secunia is hiring skilled researchers and talented developers. 1) A boundary error while processing FFFFFF45h Shockwave 3D blocks can be exploited to corrupt memory. 2) A signedness error in the processing of Director files can be exploited to corrupt memory. 3) An array indexing error when processing Director files can be exploited to corrupt memory. 4) An integer overflow error when processing Director files can be exploited to corrupt memory. 5) An error when processing asset entries contained in Director files can be exploited to corrupt memory. 6) A boundary error when processing embedded fonts can be exploited to cause a heap-based buffer overflow via a specially crafted Director file. 7) An error when processing Director files can be exploited to overwrite 4 bytes of memory. 8) An error in the implementation of ordinal function 1409 in iml32.dll can be exploited to corrupt heap memory via a specially crafted Director file. 9) An error when processing a 4-byte field inside FFFFFF49h Shockwave 3D blocks can be exploited to corrupt heap memory. 10) An unspecified error can be exploited to corrupt memory. 11) A second unspecified error can be exploited to corrupt memory. 12) A third unspecified error can be exploited to corrupt memory. 13) A fourth unspecified error can be exploited to cause a buffer overflow. 14) A fifth unspecified error can be exploited to corrupt memory. 15) A sixth unspecified error can be exploited to corrupt memory. 16) A seventh unspecified error can be exploited to corrupt memory. 17) An error when processing signed values encountered while parsing "pami" RIFF chunks can be exploited to corrupt memory. SOLUTION: Update to version 11.5.7.609. http://get.adobe.com/shockwave/ PROVIDED AND/OR DISCOVERED BY: 1-6) Alin Rad Pop, Secunia Research The vendor also credits: 2) Nahuel Riva of Core Security Technologies. 3) Chaouki Bekrar of Vupen, Code Audit Labs, and an anonymous person working with iDefense. 7) Chaouki Bekrar and Sebastien Renaud of Vupen, Code Audit Labs, Gjoko Krstic of Zero Science Lab, and Chro HD of Fortinet's FortiGuard Labs. 8, 17) an anonymous person working with ZDI. 9) Chaouki Bekrar of Vupen and an anonymous person working with ZDI. 10) Chaouki Bekrar of Vupen. 11-16) Chro HD of Fortinet's FortiGuard Labs. CHANGELOG: 2010-05-12: Updated "Extended Description" and added PoCs for vulnerabilities #2, #3, #4, and #6. ORIGINAL ADVISORY: Adobe: http://www.adobe.com/support/security/bulletins/apsb10-12.html Secunia Research: http://secunia.com/secunia_research/2010-17/ http://secunia.com/secunia_research/2010-19/ http://secunia.com/secunia_research/2010-20/ http://secunia.com/secunia_research/2010-22/ http://secunia.com/secunia_research/2010-34/ http://secunia.com/secunia_research/2010-50/ ZDI: http://www.zerodayinitiative.com/advisories/ZDI-10-087/ http://www.zerodayinitiative.com/advisories/ZDI-10-088/ http://www.zerodayinitiative.com/advisories/ZDI-10-089/ iDefense: http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=869 Code Audit Labs: http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0137.html http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0138.html http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0139.html Zero Science Lab: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4937.php Core Security Technologies: http://www.coresecurity.com/content/adobe-director-invalid-read ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. User interaction is required in that a user must visit a malicious web site. When a malicious value is used extern to signed integer . Exploitation can lead to remote system compromise under the credentials of the currently logged in user. 2010-5-11 Coordinated public release of advisory. About Code Audit Labs: ===================== Code Audit Labs is department of VulnHunt company which provide a professional security testing products / services / security consulting and training ,we sincerely hope we can help your procudes to improve code quality and safety. WebSite http://www.VulnHunt.com ( online soon) . Binary Analysis & Proof-of-concept --------------------------------------- In-depth binary analysis, code execution exploits and proof-of-concept codes are published through the VUPEN Binary Analysis & Exploits Service : http://www.vupen.com/exploits/ V. CREDIT -------------- These vulnerabilities were discovered by Chaouki Bekrar of VUPEN Security VII. ABOUT VUPEN Security --------------------------- VUPEN is a leading IT security research company providing vulnerability management and security intelligence solutions which enable enterprises and institutions to eliminate vulnerabilities before they can be exploited, ensure security policy compliance and meaningfully measure and manage risks. Governmental and federal agencies, and global enterprises in the financial services, insurance, manufacturing and technology industries rely on VUPEN to improve their security, prioritize resources, cut time and costs, and stay ahead of the latest threats. * VUPEN Vulnerability Notification Service: http://www.vupen.com/english/services/ * VUPEN Binary Analysis & Exploits Service : http://www.vupen.com/exploits/ * VUPEN Web Application Security Scanner (WASS): http://www.vupen.com/english/wass/ VIII. REFERENCES ---------------------- http://www.vupen.com/english/advisories/2010/1128 http://www.adobe.com/support/security/bulletins/apsb10-12.html http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0129 IX. ====================================================================== 2) Severity Rating: Highly critical Impact: System access Where: From remote ====================================================================== 3) Vendor's Description of Software "Over 450 million Internet-enabled desktops have installed Adobe Shockwave Player. ".dir") is opened. ====================================================================== 6) Time Table 03/03/2010 - Vendor notified. 03/03/2010 - Vendor response. 12/05/2010 - Public disclosure. ====================================================================== 9) About Secunia Secunia offers vulnerability management solutions to corporate customers with verified and reliable vulnerability intelligence relevant to their specific system configuration: http://secunia.com/advisories/business_solutions/ Secunia also provides a publicly accessible and comprehensive advisory database as a service to the security community and private individuals, who are interested in or concerned about IT-security. http://secunia.com/advisories/ Secunia believes that it is important to support the community and to do active vulnerability research in order to aid improving the security and reliability of software in general: http://secunia.com/secunia_research/ Secunia regularly hires new skilled team members. Check the URL below to see currently vacant positions: http://secunia.com/corporate/jobs/ Secunia offers a FREE mailing list called Secunia Security Advisories: http://secunia.com/advisories/mailing_lists/ ====================================================================== 10) Verification Please verify this advisory by visiting the Secunia website: http://secunia.com/secunia_research/2010-20/ Complete list of vulnerability reports published by Secunia Research: http://secunia.com/secunia_research/ ====================================================================== _______________________________________________ Full-Disclosure - We believe in it. iDefense Security Advisory 05.11.10 http://labs.idefense.com/intelligence/vulnerabilities/ May 11, 2010 I. BACKGROUND Adobe Shockwave Player is a popular Web browser plugin. It is available for multiple Web browsers and platforms, including Windows, and MacOS. Shockwave Player enables Web browsers to display rich multimedia content in the form of Shockwave videos. For more information, see the vendor's site found at the following link:<BR> <BR> http://get.adobe.com/shockwave II. <BR> <BR> The vulnerability takes place during the processing of a certain malformed file. A function calculates an offset to be used within a memory mapped file and returns the offset value. The return value is not checked. This can lead to a condition where an attacker is able to overwrite memory outside the bounds of the allocated memory map. III. To exploit this vulnerability, a targeted user must load a malicious file created by an attacker. An attacker typically accomplishes this via social engineering or injecting content into a compromised, trusted site. <BR> <BR> Adobe Shockwave Player implements a custom memory management system for object allocation. Due to the design of the memory allocator, an attacker is able to predict the distance of objects within a memory map. This condition can help facilitate reliable exploitation of this vulnerability. IV. DETECTION iDefense has confirmed the existence of this vulnerability in the latest version of Shockwave Player at the time of testing, version 11.5.6r606. V. WORKAROUND The killbit for the Shockwave Player ActiveX control can be set by creating the following registry key:<BR> <BR> HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{233C1507-6A77-46A4-9443-F871F945D258} Under this key create a new DWORD value called "Compatibility Flags" and set its hexadecimal value to 400. <BR> <BR> To re-enable Shockwave Player set the "Compatibility Flags" value to 0. VI. VENDOR RESPONSE Adobe has released a fix which addresses this issue. Information about downloadable vendor updates can be found by clicking on the URLs shown. http://get.adobe.com/shockwave/ VII. CVE INFORMATION The Common Vulnerabilities and Exposures (CVE) project has assigned the name CVE-2010-0129 to this issue. This is a candidate for inclusion in the CVE list (http://cve.mitre.org/), which standardizes names for security problems. VIII. DISCLOSURE TIMELINE 03/03/2010 Initial Vendor Notification 03/03/2009 Initial Vendor Reply 05/11/2010 Coordinated Public Disclosure IX. CREDIT The discoverer of this vulnerability wishes to remain anonymous. Get paid for vulnerability research http://labs.idefense.com/methodology/vulnerability/vcp.php Free tools, research and upcoming events http://labs.idefense.com/ X. LEGAL NOTICES Copyright \xa9 2010 iDefense, Inc. Permission is granted for the redistribution of this alert electronically. It may not be edited in any way without the express written consent of iDefense. If you wish to reprint the whole or any part of this alert in any other medium other than electronically, please e-mail customerservice@idefense.com for permission. Disclaimer: The information in the advisory is believed to be accurate at the time of publishing based on currently available information. Use of the information constitutes acceptance for use in an AS IS condition. There are no warranties with regard to this information. Neither the author nor the publisher accepts any liability for any direct, indirect, or consequential loss or damage arising from use of, or reliance on, this information. _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

Trust: 2.52

sources: NVD: CVE-2010-0129 // JVNDB: JVNDB-2010-001475 // BID: 40082 // ZSL: ZSL-2010-4937 // VULHUB: VHN-42734 // PACKETSTORM: 89462 // PACKETSTORM: 89431 // PACKETSTORM: 89490 // PACKETSTORM: 89441 // PACKETSTORM: 89436

AFFECTED PRODUCTS

vendor:adobemodel:shockwave playerscope:ltversion:11.5.7.609

Trust: 1.0

vendor:adobemodel:shockwave playerscope:lteversion:11.5.6.606

Trust: 0.8

vendor:adobemodel:shockwave playerscope:eqversion:9

Trust: 0.6

vendor:adobemodel:shockwave playerscope:eqversion:6.0

Trust: 0.6

vendor:adobemodel:shockwave playerscope:eqversion:5.0

Trust: 0.6

vendor:adobemodel:shockwave playerscope:eqversion:10.1.0.11

Trust: 0.6

vendor:adobemodel:shockwave playerscope:eqversion:3.0

Trust: 0.6

vendor:adobemodel:shockwave playerscope:eqversion:8.0

Trust: 0.6

vendor:adobemodel:shockwave playerscope:eqversion:8.5.1

Trust: 0.6

vendor:adobemodel:shockwave playerscope:eqversion:1.0

Trust: 0.6

vendor:adobemodel:shockwave playerscope:eqversion:2.0

Trust: 0.6

vendor:adobemodel:shockwave playerscope:eqversion:4.0

Trust: 0.6

vendor:adobemodel:shockwave playerscope:eqversion:11.5.6.606

Trust: 0.3

vendor:adobemodel:shockwave playerscope:eqversion:11.5.2.606

Trust: 0.3

vendor:adobemodel:shockwave playerscope:eqversion:11.5.2.602

Trust: 0.3

vendor:adobemodel:shockwave playerscope:eqversion:11.5.1.601

Trust: 0.3

vendor:adobemodel:shockwave playerscope:eqversion:11.5.601

Trust: 0.3

vendor:adobemodel:shockwave playerscope:eqversion:11.5.600

Trust: 0.3

vendor:adobemodel:shockwave playerscope:eqversion:11.5.596

Trust: 0.3

vendor:adobemodel:shockwave playerscope:neversion:11.5.7.609

Trust: 0.3

vendor:adobe incorporatedmodel:shockwave playerscope:eqversion:11.5.6.606

Trust: 0.1

sources: ZSL: ZSL-2010-4937 // BID: 40082 // JVNDB: JVNDB-2010-001475 // CNNVD: CNNVD-201005-191 // NVD: CVE-2010-0129

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2010-0129
value: HIGH

Trust: 1.0

NVD: CVE-2010-0129
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201005-191
value: HIGH

Trust: 0.6

ZSL: ZSL-2010-4937
value: (4/5)

Trust: 0.1

VULHUB: VHN-42734
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2010-0129
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-42734
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2010-0129
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

sources: ZSL: ZSL-2010-4937 // VULHUB: VHN-42734 // JVNDB: JVNDB-2010-001475 // CNNVD: CNNVD-201005-191 // NVD: CVE-2010-0129

PROBLEMTYPE DATA

problemtype:CWE-190

Trust: 1.0

problemtype:CWE-189

Trust: 0.9

sources: VULHUB: VHN-42734 // JVNDB: JVNDB-2010-001475 // NVD: CVE-2010-0129

THREAT TYPE

remote

Trust: 0.8

sources: PACKETSTORM: 89431 // PACKETSTORM: 89436 // CNNVD: CNNVD-201005-191

TYPE

input validation error

Trust: 0.6

sources: CNNVD: CNNVD-201005-191

CONFIGURATIONS

sources: JVNDB: JVNDB-2010-001475

EXPLOIT AVAILABILITY

sources: ZSL: ZSL-2010-4937 // VULHUB: VHN-42734

PATCH

title:APSB10-12url:http://www.adobe.com/support/security/bulletins/apsb10-12.html

Trust: 0.8

title:APSB10-12url:http://www.adobe.com/jp/support/security/bulletins/apsb10-12.html

Trust: 0.8

title:Shockwave 11.5.7.609 for Mac Slimurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=3595

Trust: 0.6

title:Adobe Shockwave Player version 11.5.7.609url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=3594

Trust: 0.6

sources: JVNDB: JVNDB-2010-001475 // CNNVD: CNNVD-201005-191

EXTERNAL IDS

db:NVDid:CVE-2010-0129

Trust: 3.2

db:SECUNIAid:38751

Trust: 2.9

db:BIDid:40082

Trust: 2.8

db:VUPENid:ADV-2010-1128

Trust: 2.7

db:JVNDBid:JVNDB-2010-001475

Trust: 0.8

db:CNNVDid:CNNVD-201005-191

Trust: 0.7

db:ZSLid:ZSL-2010-4937

Trust: 0.3

db:PACKETSTORMid:89436

Trust: 0.2

db:PACKETSTORMid:89441

Trust: 0.2

db:PACKETSTORMid:89490

Trust: 0.2

db:PACKETSTORMid:89431

Trust: 0.2

db:XFid:58447

Trust: 0.1

db:EXPLOIT-DBid:12578

Trust: 0.1

db:BIDid:40081

Trust: 0.1

db:OSVDBid:64646

Trust: 0.1

db:AUSCERTid:ESB-2010.0436

Trust: 0.1

db:SECTRACKid:1023980

Trust: 0.1

db:VULHUBid:VHN-42734

Trust: 0.1

db:ZDIid:ZDI-10-087

Trust: 0.1

db:ZDIid:ZDI-10-089

Trust: 0.1

db:ZDIid:ZDI-10-088

Trust: 0.1

db:PACKETSTORMid:89462

Trust: 0.1

sources: ZSL: ZSL-2010-4937 // VULHUB: VHN-42734 // BID: 40082 // JVNDB: JVNDB-2010-001475 // PACKETSTORM: 89462 // PACKETSTORM: 89431 // PACKETSTORM: 89490 // PACKETSTORM: 89441 // PACKETSTORM: 89436 // CNNVD: CNNVD-201005-191 // NVD: CVE-2010-0129

REFERENCES

url:http://www.vupen.com/english/advisories/2010/1128

Trust: 2.7

url:http://www.securityfocus.com/bid/40082

Trust: 2.5

url:http://secunia.com/advisories/38751

Trust: 2.5

url:http://www.adobe.com/support/security/bulletins/apsb10-12.html

Trust: 2.4

url:http://secunia.com/secunia_research/2010-20/

Trust: 2.2

url:http://hi.baidu.com/fs_fx/blog/item/fa74a61705b5e24621a4e951.html

Trust: 2.1

url:http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0138.html

Trust: 1.8

url:http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=869

Trust: 1.8

url:http://www.securityfocus.com/archive/1/511262/100/0/threaded

Trust: 1.7

url:http://www.securityfocus.com/archive/1/511256/100/0/threaded

Trust: 1.7

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a7134

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0129

Trust: 0.9

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-0129

Trust: 0.8

url:http://www.adobe.com/products/shockwaveplayer/

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2010-0129

Trust: 0.4

url:http://secunia.com/advisories/38751/

Trust: 0.2

url:http://get.adobe.com/shockwave/

Trust: 0.2

url:http://www.vulnhunt.com

Trust: 0.2

url:http://secunia.com/

Trust: 0.2

url:http://lists.grok.org.uk/full-disclosure-charter.html

Trust: 0.2

url:http://packetstormsecurity.org/filedesc/zsl-2010-4937.txt.html

Trust: 0.1

url:http://www.qualys.com/research/alerts/view.php/2010-05-11-2

Trust: 0.1

url:http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2010-1280

Trust: 0.1

url:http://www.exploit-db.com/exploits/12578

Trust: 0.1

url:http://www.securityfocus.com/bid/40081

Trust: 0.1

url:http://www.0daynet.com/2010/0512/335.html

Trust: 0.1

url:http://securityreason.com/exploitalert/8249

Trust: 0.1

url:http://forums.cnet.com/5208-6132_102-0.html?messageid=3303052

Trust: 0.1

url:http://news.dreamings.org/?p=1050

Trust: 0.1

url:http://securitytracker.com/alerts/2010/may/1023980.html

Trust: 0.1

url:http://www.auscert.org.au/render.html?it=12789

Trust: 0.1

url:http://securityvulns.ru/xdocument830.html

Trust: 0.1

url:http://xforce.iss.net/xforce/xfdb/58447

Trust: 0.1

url:http://osvdb.org/show/osvdb/64646

Trust: 0.1

url:http://www.nessus.org/plugins/index.php?view=single&amp;id=46329

Trust: 0.1

url:http://secunia.com/secunia_research/2010-19/

Trust: 0.1

url:http://www.zerodayinitiative.com/advisories/zdi-10-089/

Trust: 0.1

url:http://secunia.com/company/jobs/

Trust: 0.1

url:http://secunia.com/secunia_research/2010-17/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://www.zerodayinitiative.com/advisories/zdi-10-087/

Trust: 0.1

url:http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0139.html

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/secunia_research/2010-34/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://www.zerodayinitiative.com/advisories/zdi-10-088/

Trust: 0.1

url:http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0137.html

Trust: 0.1

url:http://secunia.com/secunia_research/2010-22/

Trust: 0.1

url:http://secunia.com/secunia_research/2010-50/

Trust: 0.1

url:http://www.coresecurity.com/content/adobe-director-invalid-read

Trust: 0.1

url:http://www.zeroscience.mk/en/vulnerabilities/zsl-2010-4937.php

Trust: 0.1

url:http://www.vupen.com/english/wass/

Trust: 0.1

url:http://www.vupen.com/english/research.php

Trust: 0.1

url:http://www.vupen.com/english/services/

Trust: 0.1

url:http://www.vupen.com/exploits/

Trust: 0.1

url:http://secunia.com/secunia_research/

Trust: 0.1

url:http://secunia.com/corporate/jobs/

Trust: 0.1

url:http://secunia.com/advisories/mailing_lists/

Trust: 0.1

url:http://secunia.com/advisories/

Trust: 0.1

url:http://secunia.com/advisories/business_solutions/

Trust: 0.1

url:http://cve.mitre.org/),

Trust: 0.1

url:http://get.adobe.com/shockwave

Trust: 0.1

url:http://labs.idefense.com/intelligence/vulnerabilities/

Trust: 0.1

url:http://labs.idefense.com/methodology/vulnerability/vcp.php

Trust: 0.1

url:http://labs.idefense.com/

Trust: 0.1

sources: ZSL: ZSL-2010-4937 // VULHUB: VHN-42734 // BID: 40082 // JVNDB: JVNDB-2010-001475 // PACKETSTORM: 89462 // PACKETSTORM: 89431 // PACKETSTORM: 89490 // PACKETSTORM: 89441 // PACKETSTORM: 89436 // CNNVD: CNNVD-201005-191 // NVD: CVE-2010-0129

CREDITS

VulnHunt http://www.vulnhunt.com/

Trust: 0.6

sources: CNNVD: CNNVD-201005-191

SOURCES

db:ZSLid:ZSL-2010-4937
db:VULHUBid:VHN-42734
db:BIDid:40082
db:JVNDBid:JVNDB-2010-001475
db:PACKETSTORMid:89462
db:PACKETSTORMid:89431
db:PACKETSTORMid:89490
db:PACKETSTORMid:89441
db:PACKETSTORMid:89436
db:CNNVDid:CNNVD-201005-191
db:NVDid:CVE-2010-0129

LAST UPDATE DATE

2024-11-23T21:47:30.780000+00:00


SOURCES UPDATE DATE

db:ZSLid:ZSL-2010-4937date:2011-03-06T00:00:00
db:VULHUBid:VHN-42734date:2018-10-10T00:00:00
db:BIDid:40082date:2010-05-12T11:12:00
db:JVNDBid:JVNDB-2010-001475date:2010-05-28T00:00:00
db:CNNVDid:CNNVD-201005-191date:2022-06-08T00:00:00
db:NVDid:CVE-2010-0129date:2024-11-21T01:11:35.620

SOURCES RELEASE DATE

db:ZSLid:ZSL-2010-4937date:2010-05-11T00:00:00
db:VULHUBid:VHN-42734date:2010-05-13T00:00:00
db:BIDid:40082date:2010-05-11T00:00:00
db:JVNDBid:JVNDB-2010-001475date:2010-05-28T00:00:00
db:PACKETSTORMid:89462date:2010-05-13T07:29:48
db:PACKETSTORMid:89431date:2010-05-12T02:59:43
db:PACKETSTORMid:89490date:2010-05-14T14:47:20
db:PACKETSTORMid:89441date:2010-05-12T15:27:06
db:PACKETSTORMid:89436date:2010-05-12T15:17:03
db:CNNVDid:CNNVD-201005-191date:2010-05-13T00:00:00
db:NVDid:CVE-2010-0129date:2010-05-13T17:30:01.827