ID

VAR-201006-1242


CVE

CVE-2010-2204


TITLE

Adobe Flash ActionScript AVM2 newfunction vulnerability

Trust: 0.8

sources: CERT/CC: VU#486225

DESCRIPTION

Unspecified vulnerability in Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allows attackers to cause a denial of service or possibly execute arbitrary code via unknown vectors. Adobe Flash contains a vulnerability in the handling of the ActionScript newfunction instruction, which can allow a remote, unauthenticated attacker to execute arbitrary code. Adobe Acrobat and Reader are prone to multiple remote vulnerabilities. Attackers can exploit these issues to execute arbitrary code or cause denial-of-service conditions. Adobe Reader and Acrobat versions prior to and including 9.3.2 and 8.2.2 are affected. This BID is being retired. The following individual records exist to better document the issues: 41230 Adobe Acrobat and Reader CVE-2010-1295 Remote Memory Corruption Vulnerability 41231 Adobe Acrobat and Reader CoolType Typography Engine Remote Denial of Service Vulnerability 41232 Adobe Acrobat andReader CVE-2010-1285 Remote Code Execution Vulnerability 41234 Adobe Acrobat and Reader CVE-2010-2202 Remote Memory Corruption Vulnerability 41235 Adobe Acrobat and Reader CVE-2010-2203 Remote Memory Corruption Vulnerability 41236 Adobe Acrobat and Reader CVE-2010-2168 Remote Code Execution Vulnerability 41237 Adobe Acrobat and Reader CVE-2010-2201 Remote Code Execution Vulnerability 41238 Adobe Acrobat and Reader CVE-2010-2205 Remote Code Execution Vulnerability 41239 Adobe Acrobat and Reader CVE-2010-2207 Remote Memory Corruption Vulnerability 41240 Adobe Acrobat and Reader CVE-2010-2209 Remote Memory Corruption Vulnerability 41241 Adobe Acrobat and Reader CVE-2010-2206 Remote Code Execution Vulnerability 41242 Adobe Acrobat and Reader CVE-2010-2210 Remote Memory Corruption Vulnerability 41243 Adobe Acrobat and Reader CVE-2010-2211 Remote Memory Corruption Vulnerability 41244 Adobe Acrobat and Reader CVE-2010-2208 Remote Code Execution Vulnerability 41245 Adobe Acrobat and Reader CVE-2010-2212 Remote Memory Corruption Vulnerability. Attackers can exploit this issue to crash the affected application, denying service to legitimate users. Due to the nature of this issue, arbitrary code-execution may be possible; however this has not been confirmed. Adobe Reader software is the global standard for electronic document sharing. It is the only PDF file viewer that can open and interact with all PDF documents. The issue is triggered when the reader tries to initialize the CoolType Typography Engine (cooltype.dll). This vulnerability also affects and crashes major browsers like: Mozilla Firefox, Opera and Apple Safari. Google Chrome &amp; IE does not crash. Talking about Blended Threat Vulnerabilities ;).<br/><br/> --------------------------------------------------------------------------------<br/><br/><code> (bd0.e14): Access violation - code c0000005 (first chance)<br/> First chance exceptions are reported before any exception handling.<br/> This exception may be expected and handled.<br/> eax=313100ee ebx=0211a722 ecx=00000031 edx=02e091a4 esi=00017e58 edi=00000000<br/> eip=08075dc2 esp=0012d478 ebp=0012d488 iopl=0 nv up ei pl nz na pe nc<br/> cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00010206<br/> CoolType!CTInit+0x2f827:<br/> 08075dc2 660fb644322c movzx ax,byte ptr [edx+esi+2Ch] ds:0023:02e21028=??<br/></code><br/>--------------------------------------------------------------------------------<br/><br/>Tested on: Microsoft Windows XP Professional SP3 (English)Microsoft Windows XP Professional SP2 (English)Microsoft Windows 7 UltimateGNU/Linux Ubuntu Desktop 9.10 (i386) 32-bitGNU/Linux Fedora 10 (Cambridge) / 2.6.27.41-170.2.117.fc10.i686. Remote attackers can cause denial of service or possible execution through unknown vectors. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201009-05 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: Adobe Reader: Multiple vulnerabilities Date: September 07, 2010 Bugs: #297385, #306429, #313343, #322857 ID: 201009-05 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities in Adobe Reader might result in the execution of arbitrary code or other attacks. For further information please consult the CVE entries and the Adobe Security Bulletins referenced below. Workaround ========== There is no known workaround at this time. Resolution ========== All Adobe Reader users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=app-text/acroread-9.3.4" References ========== [ 1 ] APSA10-01 http://www.adobe.com/support/security/advisories/apsa10-01.html [ 2 ] APSB10-02 http://www.adobe.com/support/security/bulletins/apsb10-02.html [ 3 ] APSB10-07 http://www.adobe.com/support/security/bulletins/apsb10-07.html [ 4 ] APSB10-09 http://www.adobe.com/support/security/bulletins/apsb10-09.html [ 5 ] APSB10-14 http://www.adobe.com/support/security/bulletins/apsb10-14.html [ 6 ] APSB10-16 http://www.adobe.com/support/security/bulletins/apsb10-16.html [ 7 ] CVE-2009-3953 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3953 [ 8 ] CVE-2009-4324 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4324 [ 9 ] CVE-2010-0186 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0186 [ 10 ] CVE-2010-0188 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0188 [ 11 ] CVE-2010-0190 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0190 [ 12 ] CVE-2010-0191 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0191 [ 13 ] CVE-2010-0192 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0192 [ 14 ] CVE-2010-0193 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0193 [ 15 ] CVE-2010-0194 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0194 [ 16 ] CVE-2010-0195 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0195 [ 17 ] CVE-2010-0196 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0196 [ 18 ] CVE-2010-0197 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0197 [ 19 ] CVE-2010-0198 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0198 [ 20 ] CVE-2010-0199 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0199 [ 21 ] CVE-2010-0201 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0201 [ 22 ] CVE-2010-0202 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0202 [ 23 ] CVE-2010-0203 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0203 [ 24 ] CVE-2010-0204 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0204 [ 25 ] CVE-2010-1241 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1241 [ 26 ] CVE-2010-1285 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1285 [ 27 ] CVE-2010-1295 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1295 [ 28 ] CVE-2010-1297 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1297 [ 29 ] CVE-2010-2168 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2168 [ 30 ] CVE-2010-2201 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2201 [ 31 ] CVE-2010-2202 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2202 [ 32 ] CVE-2010-2203 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2203 [ 33 ] CVE-2010-2204 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2204 [ 34 ] CVE-2010-2205 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2205 [ 35 ] CVE-2010-2206 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2206 [ 36 ] CVE-2010-2207 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2207 [ 37 ] CVE-2010-2208 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2208 [ 38 ] CVE-2010-2209 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2209 [ 39 ] CVE-2010-2210 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2210 [ 40 ] CVE-2010-2211 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2211 [ 41 ] CVE-2010-2212 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2212 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-201009-05.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2010 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5 . ---------------------------------------------------------------------- Secunia CSI integrated with Microsoft WSUS and Microsoft SCCM for 3rd party Patch Management Free webinars http://secunia.com/vulnerability_scanning/corporate/webinars/ ---------------------------------------------------------------------- TITLE: Adobe Flash Player Unspecified Code Execution Vulnerability SECUNIA ADVISORY ID: SA40026 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/40026/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=40026 RELEASE DATE: 2010-06-05 DISCUSS ADVISORY: http://secunia.com/advisories/40026/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/40026/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=40026 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: A vulnerability has been reported in Adobe Flash Player, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to an unspecified error. No more information is currently available. The vulnerability is reported in version 10.0.45.2 and prior 10.0.x and 9.0.x versions for Windows, Macintosh, Linux, and Solaris. NOTE: The vulnerability is reportedly being actively exploited. SOLUTION: Reportedly, the latest version 10.1 Release Candidate is not affected. Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ PROVIDED AND/OR DISCOVERED BY: Reported as a 0-day. ORIGINAL ADVISORY: Adobe: http://www.adobe.com/support/security/advisories/apsa10-01.html OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXPLOIT: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 National Cyber Alert System Technical Cyber Security Alert TA10-159A Adobe Flash, Reader, and Acrobat Vulnerability Original release date: June 08, 2010 Last revised: -- Source: US-CERT Systems Affected * Adobe Flash Player 10.0.45.2 and earlier 10.x versions * Adobe Flash Player 9.0.262 and earlier 9.x versions * Adobe Reader 9.3.2 and earlier 9.x versions * Adobe Acrobat 9.3.2 and earlier 9.x versions Other Adobe products that support Flash may also be vulnerable. Overview According to Adobe, there is a vulnerability in Adobe Flash. This vulnerability affects Flash Player, Reader, Acrobat, and possibly other products that support Flash. I. It may also affect other products that independently support Flash, such as Photoshop, Photoshop Lightroom, Freehand MX, and Fireworks. An attacker could exploit this vulnerability by convincing a user to open specially crafted Flash content. Flash content is commonly hosted on a web page, but it can also be embedded in PDF and other documents or provided as a stand-alone file. II. III. Solution Update Adobe Security Advisory APSA10-01 suggests updating to the release candidate of Flash Player 10.1. Disable Flash in your web browser Uninstall Flash or restrict which sites are allowed to run Flash. To the extent possible, only run trusted Flash content on trusted domains. For more information, see Securing Your Web Browser. Disable Flash in Adobe Reader and Acrobat Disabling Flash in Adobe Reader will mitigate attacks that rely on Flash content embedded in a PDF file. Disabling 3D & Multimedia support does not directly address the vulnerability, but it does provide additional mitigation and results in a more user-friendly error message instead of a crash. To disable Flash and 3D & Multimedia support in Adobe Reader 9, delete, rename, or remove access to these files: Microsoft Windows "%ProgramFiles%\Adobe\Reader 9.0\Reader\authplay.dll" "%ProgramFiles%\Adobe\Reader 9.0\Reader\rt3d.dll" Apple Mac OS X "/Applications/Adobe Reader 9/Adobe Reader.app/Contents/Frameworks/AuthPlayLib.bundle" "/Applications/Adobe Reader 9/Adobe Reader.app/Contents/Frameworks/Adobe3D.framework" GNU/Linux (locations may vary among distributions) "/opt/Adobe/Reader9/Reader/intellinux/lib/libauthplay.so" "/opt/Adobe/Reader9/Reader/intellinux/lib/librt3d.so" File locations may be different for Adobe Acrobat or other Adobe products that include Flash and 3D & Multimedia support. Disabling these plugins will reduce functionality and will not protect against Flash content hosted on websites. Depending on the update schedule for products other than Flash Player, consider leaving Flash and 3D & Multimedia support disabled unless they are absolutely required. Prevent Internet Explorer from automatically opening PDF documents The installer for Adobe Reader and Acrobat configures Internet Explorer to automatically open PDF files without any user interaction. This behavior can be reverted to a safer option that prompts the user by importing the following as a .REG file: Windows Registry Editor Version 5.00 [HKEY_CLASSES_ROOT\AcroExch.Document.7] "EditFlags"=hex:00,00,00,00 Disable the display of PDF documents in the web browser Preventing PDF documents from opening inside a web browser will partially mitigate this vulnerability. If this workaround is applied, it may also mitigate future vulnerabilities. To prevent PDF documents from automatically being opened in a web browser, do the following: 1. 2. Open the Edit menu. 3. Choose the Preferences option. 4. Choose the Internet section. 5. Uncheck the "Display PDF in browser" checkbox. Disable JavaScript in Adobe Reader and Acrobat Disabling JavaScript provides some additional protection against attacks. Acrobat JavaScript can be disabled using the Preferences menu (Edit -> Preferences -> JavaScript; uncheck Enable Acrobat JavaScript). Enable DEP in Microsoft Windows Consider enabling Data Execution Prevention (DEP) in supported versions of Windows. DEP should not be treated as a complete workaround, but it can mitigate the execution of attacker-supplied code in some cases. Microsoft has published detailed technical information about DEP in Security Research & Defense blog posts "Understanding DEP as a mitigation technology" part 1 and part 2. Use of DEP should be considered in conjunction with the application of patches or other mitigations described in this document. Do not access PDF documents from untrusted sources Do not open unfamiliar or unexpected PDF documents, particularly those hosted on websites or delivered as email attachments. Please see Cyber Security Tip ST04-010. IV. References * Security Advisory for Flash Player, Adobe Reader and Acrobat - <http://www.adobe.com/support/security/advisories/apsa10-01.html> * Adobe Labs - Flash Player 10 pre-release - <http://labs.adobe.com/technologies/flashplayer10/> * US-CERT Vulnerability Note VU#486225 - <http://www.kb.cert.org/vuls/id/486225> * Securing Your Web Browser - <http://www.us-cert.gov/reading_room/securing_browser/> * Understanding DEP as a mitigation technology part 1 - <http://blogs.technet.com/b/srd/archive/2009/06/05/understanding-dep-as-a-mitigation-technology-part-1.aspx> * Understanding DEP as a mitigation technology part 2 - <http://blogs.technet.com/b/srd/archive/2009/06/12/understanding-dep-as-a-mitigation-technology-part-2.aspx> ____________________________________________________________________ The most recent version of this document can be found at: <http://www.us-cert.gov/cas/techalerts/TA10-159A.html> ____________________________________________________________________ Feedback can be directed to US-CERT Technical Staff. Please send email to <cert@cert.org> with "TA10-159A Feedback VU#486225" in the subject. ____________________________________________________________________ For instructions on subscribing to or unsubscribing from this mailing list, visit <http://www.us-cert.gov/cas/signup.html>. ____________________________________________________________________ Produced 2010 by US-CERT, a government organization. Terms of use: <http://www.us-cert.gov/legal.html> ____________________________________________________________________ Revision History June 08, 2010: Initial release -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.5 (GNU/Linux) iQEVAwUBTA65yT6pPKYJORa3AQLS9wf/fh+7IwRtBvoPgn8pYeOsVheLkbVLWC3W miWUnY1acuPTwZzG5JcAldRHksFkx1j0mMEvp4PhtiTr51JFPi4XgDfrG4cEcVaw nuAqEV+hLAWZkMex/jWxBV+85tZqKN0kiUr3bq5DPsdkhjV7c2MFfS8BSxLXLuPm OFAXPT+XFldq6MJhYUOtWT1CIz6PNPfo68KmZaUThjdqkkBW3HQu90OSRf2c6M/u V6KBQf7QuhpPqYUqAZU6ZUNEfL/7g2BwvuPjUMlgE5N+Z8EYnhyhu0qDtZeLUcXA 2gH31VEr79DUHJqpb9jk61bi5Dm4gjHeLHoTAwu0IrduZzXvWncfIg== =ZPZM -----END PGP SIGNATURE----- . SOLUTION: Delete, rename, or remove access to authplay.dll to prevent running SWF content in PDF files

Trust: 3.42

sources: NVD: CVE-2010-2204 // CERT/CC: VU#486225 // JVNDB: JVNDB-2010-001710 // BID: 41130 // BID: 41231 // ZSL: ZSL-2010-4943 // VULHUB: VHN-44809 // PACKETSTORM: 93607 // PACKETSTORM: 90322 // PACKETSTORM: 90516 // PACKETSTORM: 90321

AFFECTED PRODUCTS

vendor:adobemodel:acrobatscope:eqversion:9.3.2

Trust: 1.6

vendor:adobemodel:acrobatscope:eqversion:9.3.1

Trust: 1.6

vendor:adobemodel:acrobatscope:eqversion:9.1.1

Trust: 1.6

vendor:adobemodel:acrobatscope:eqversion:8.2.2

Trust: 1.6

vendor:adobemodel:acrobatscope:eqversion:9.3

Trust: 1.6

vendor:adobemodel:acrobatscope:eqversion:9.2

Trust: 1.6

vendor:adobemodel:acrobat readerscope:eqversion:8.1.7

Trust: 1.6

vendor:adobemodel:acrobat readerscope:eqversion:8.1.1

Trust: 1.6

vendor:adobemodel:acrobat readerscope:eqversion:8.1.6

Trust: 1.6

vendor:adobemodel:acrobat readerscope:eqversion:8.2.2

Trust: 1.6

vendor:adobemodel:acrobat readerscope:eqversion:8.1.5

Trust: 1.6

vendor:adobemodel:acrobat readerscope:eqversion:8.2.1

Trust: 1.6

vendor:adobemodel:acrobat readerscope:eqversion:8.1.2

Trust: 1.6

vendor:adobemodel:acrobat readerscope:eqversion:8.1

Trust: 1.6

vendor:adobemodel:acrobat readerscope:eqversion:8.1.4

Trust: 1.6

vendor:adobemodel:acrobat readerscope:eqversion:8.0

Trust: 1.6

vendor:adobemodel:acrobat readerscope:eqversion:9.1.2

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:8.2

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:9.2

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:9.3.1

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:8.1.4

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:8.1.6

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:9.1.3

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:8.1.3

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:8.2.1

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:9.3

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:9.1

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:9.0

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:8.1

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:8.1.7

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:9.1.2

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:8.1.5

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:8.1.1

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:9.3.2

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:8.0

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:9.1.3

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:9.1

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:9.0

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:9.1.1

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:8.1.2

Trust: 1.0

vendor:adobemodel: - scope: - version: -

Trust: 0.8

vendor:adobemodel:acrobatscope:lteversion:9.3.2

Trust: 0.8

vendor:adobemodel:readerscope:lteversion:9.3.2

Trust: 0.8

vendor:red hatmodel:enterprise linux extrasscope:eqversion:4 extras

Trust: 0.8

vendor:red hatmodel:enterprise linux extrasscope:eqversion:4.8.z extras

Trust: 0.8

vendor:red hatmodel:rhel desktop supplementaryscope:eqversion:5 (client)

Trust: 0.8

vendor:red hatmodel:rhel supplementaryscope:eqversion:5 (server)

Trust: 0.8

vendor:red hatmodel:rhel supplementary eusscope:eqversion:5.4.z (server)

Trust: 0.8

vendor:adobemodel:readerscope:eqversion:9.3.2

Trust: 0.6

vendor:adobemodel:readerscope:eqversion:9.3.1

Trust: 0.6

vendor:adobemodel:readerscope:eqversion:9.1.3

Trust: 0.6

vendor:adobemodel:readerscope:eqversion:9.1.2

Trust: 0.6

vendor:adobemodel:readerscope:eqversion:9.1.1

Trust: 0.6

vendor:adobemodel:readerscope:eqversion:8.2.2

Trust: 0.6

vendor:adobemodel:readerscope:eqversion:8.2.1

Trust: 0.6

vendor:adobemodel:readerscope:eqversion:8.1.7

Trust: 0.6

vendor:adobemodel:readerscope:eqversion:8.1.6

Trust: 0.6

vendor:adobemodel:readerscope:eqversion:8.1.5

Trust: 0.6

vendor:adobemodel:readerscope:eqversion:8.1.4

Trust: 0.6

vendor:adobemodel:readerscope:eqversion:8.1.3

Trust: 0.6

vendor:adobemodel:readerscope:eqversion:8.1.2

Trust: 0.6

vendor:adobemodel:readerscope:eqversion:8.1.1

Trust: 0.6

vendor:adobemodel:readerscope:eqversion:7.1.4

Trust: 0.6

vendor:adobemodel:readerscope:eqversion:7.1.3

Trust: 0.6

vendor:adobemodel:readerscope:eqversion:7.1.2

Trust: 0.6

vendor:adobemodel:readerscope:eqversion:7.1.1

Trust: 0.6

vendor:adobemodel:readerscope:eqversion:7.0.9

Trust: 0.6

vendor:adobemodel:readerscope:eqversion:7.0.8

Trust: 0.6

vendor:adobemodel:readerscope:eqversion:7.0.7

Trust: 0.6

vendor:adobemodel:readerscope:eqversion:7.0.6

Trust: 0.6

vendor:adobemodel:readerscope:eqversion:7.0.5

Trust: 0.6

vendor:adobemodel:readerscope:eqversion:7.0.4

Trust: 0.6

vendor:adobemodel:readerscope:eqversion:7.0.3

Trust: 0.6

vendor:adobemodel:readerscope:eqversion:7.0.2

Trust: 0.6

vendor:adobemodel:readerscope:eqversion:7.0.1

Trust: 0.6

vendor:adobemodel:readerscope:eqversion:7.0

Trust: 0.6

vendor:adobemodel:readerscope:eqversion:9.3

Trust: 0.6

vendor:adobemodel:readerscope:eqversion:9.2

Trust: 0.6

vendor:adobemodel:readerscope:eqversion:9.1

Trust: 0.6

vendor:adobemodel:readerscope:eqversion:8.2

Trust: 0.6

vendor:adobemodel:reader security updatscope:eqversion:8.1.2

Trust: 0.6

vendor:adobemodel:readerscope:eqversion:8.1

Trust: 0.6

vendor:adobemodel:readerscope:eqversion:8.0

Trust: 0.6

vendor:adobemodel:readerscope:eqversion:7.1

Trust: 0.6

vendor:adobemodel:acrobat standardscope:eqversion:9.3.2

Trust: 0.6

vendor:adobemodel:acrobat standardscope:eqversion:9.3.1

Trust: 0.6

vendor:adobemodel:acrobat standardscope:eqversion:9.1.3

Trust: 0.6

vendor:adobemodel:acrobat standardscope:eqversion:9.1.2

Trust: 0.6

vendor:adobemodel:acrobat standardscope:eqversion:8.2.2

Trust: 0.6

vendor:adobemodel:acrobat standardscope:eqversion:8.2.1

Trust: 0.6

vendor:adobemodel:acrobat standardscope:eqversion:8.1.7

Trust: 0.6

vendor:adobemodel:acrobat standardscope:eqversion:8.1.6

Trust: 0.6

vendor:adobemodel:acrobat standardscope:eqversion:8.1.4

Trust: 0.6

vendor:adobemodel:acrobat standardscope:eqversion:8.1.3

Trust: 0.6

vendor:adobemodel:acrobat standardscope:eqversion:8.1.2

Trust: 0.6

vendor:adobemodel:acrobat standardscope:eqversion:8.1.1

Trust: 0.6

vendor:adobemodel:acrobat standardscope:eqversion:7.1.4

Trust: 0.6

vendor:adobemodel:acrobat standardscope:eqversion:7.1.3

Trust: 0.6

vendor:adobemodel:acrobat standardscope:eqversion:7.1.1

Trust: 0.6

vendor:adobemodel:acrobat standardscope:eqversion:7.0.8

Trust: 0.6

vendor:adobemodel:acrobat standardscope:eqversion:7.0.7

Trust: 0.6

vendor:adobemodel:acrobat standardscope:eqversion:7.0.6

Trust: 0.6

vendor:adobemodel:acrobat standardscope:eqversion:7.0.5

Trust: 0.6

vendor:adobemodel:acrobat standardscope:eqversion:7.0.4

Trust: 0.6

vendor:adobemodel:acrobat standardscope:eqversion:7.0.3

Trust: 0.6

vendor:adobemodel:acrobat standardscope:eqversion:7.0.2

Trust: 0.6

vendor:adobemodel:acrobat standardscope:eqversion:7.0.1

Trust: 0.6

vendor:adobemodel:acrobat standardscope:eqversion:7.0

Trust: 0.6

vendor:adobemodel:acrobat standardscope:eqversion:9.3

Trust: 0.6

vendor:adobemodel:acrobat standardscope:eqversion:9.2

Trust: 0.6

vendor:adobemodel:acrobat standardscope:eqversion:9.1

Trust: 0.6

vendor:adobemodel:acrobat standardscope:eqversion:9

Trust: 0.6

vendor:adobemodel:acrobat standardscope:eqversion:8.2

Trust: 0.6

vendor:adobemodel:acrobat standardscope:eqversion:8.1

Trust: 0.6

vendor:adobemodel:acrobat standardscope:eqversion:8.0

Trust: 0.6

vendor:adobemodel:acrobat standardscope:eqversion:7.1

Trust: 0.6

vendor:adobemodel:acrobat professionalscope:eqversion:9.3.2

Trust: 0.6

vendor:adobemodel:acrobat professionalscope:eqversion:9.3.1

Trust: 0.6

vendor:adobemodel:acrobat professionalscope:eqversion:9.1.3

Trust: 0.6

vendor:adobemodel:acrobat professionalscope:eqversion:9.1.2

Trust: 0.6

vendor:adobemodel:acrobat professionalscope:eqversion:8.2.2

Trust: 0.6

vendor:adobemodel:acrobat professionalscope:eqversion:8.2.1

Trust: 0.6

vendor:adobemodel:acrobat professionalscope:eqversion:8.1.7

Trust: 0.6

vendor:adobemodel:acrobat professionalscope:eqversion:8.1.6

Trust: 0.6

vendor:adobemodel:acrobat professionalscope:eqversion:8.1.4

Trust: 0.6

vendor:adobemodel:acrobat professionalscope:eqversion:8.1.3

Trust: 0.6

vendor:adobemodel:acrobat professionalscope:eqversion:8.1.2

Trust: 0.6

vendor:adobemodel:acrobat professionalscope:eqversion:8.1.1

Trust: 0.6

vendor:adobemodel:acrobat professionalscope:eqversion:7.1.4

Trust: 0.6

vendor:adobemodel:acrobat professionalscope:eqversion:7.1.3

Trust: 0.6

vendor:adobemodel:acrobat professionalscope:eqversion:7.1.1

Trust: 0.6

vendor:adobemodel:acrobat professionalscope:eqversion:7.0.9

Trust: 0.6

vendor:adobemodel:acrobat professionalscope:eqversion:7.0.8

Trust: 0.6

vendor:adobemodel:acrobat professionalscope:eqversion:7.0.7

Trust: 0.6

vendor:adobemodel:acrobat professionalscope:eqversion:7.0.6

Trust: 0.6

vendor:adobemodel:acrobat professionalscope:eqversion:7.0.5

Trust: 0.6

vendor:adobemodel:acrobat professionalscope:eqversion:7.0.4

Trust: 0.6

vendor:adobemodel:acrobat professionalscope:eqversion:7.0.3

Trust: 0.6

vendor:adobemodel:acrobat professionalscope:eqversion:7.0.2

Trust: 0.6

vendor:adobemodel:acrobat professionalscope:eqversion:7.0.1

Trust: 0.6

vendor:adobemodel:acrobat professionalscope:eqversion:7.0

Trust: 0.6

vendor:adobemodel:acrobat professionalscope:eqversion:9.3

Trust: 0.6

vendor:adobemodel:acrobat professionalscope:eqversion:9.2

Trust: 0.6

vendor:adobemodel:acrobat professionalscope:eqversion:9.1

Trust: 0.6

vendor:adobemodel:acrobat professionalscope:eqversion:9

Trust: 0.6

vendor:adobemodel:acrobat professionalscope:eqversion:8.2

Trust: 0.6

vendor:adobemodel:acrobat professional security updatscope:eqversion:8.1.2

Trust: 0.6

vendor:adobemodel:acrobat professionalscope:eqversion:8.1

Trust: 0.6

vendor:adobemodel:acrobat professionalscope:eqversion:8.0

Trust: 0.6

vendor:adobemodel:acrobat professionalscope:eqversion:7.1

Trust: 0.6

vendor:adobemodel:acrobat professionalscope:eqversion:6.0

Trust: 0.6

vendor:adobemodel:acrobatscope:eqversion:7.0.9

Trust: 0.6

vendor:adobemodel:acrobatscope:eqversion:7.0.3

Trust: 0.6

vendor:adobemodel:acrobatscope:eqversion:7.0.2

Trust: 0.6

vendor:adobemodel:acrobatscope:eqversion:7.0.1

Trust: 0.6

vendor:adobemodel:acrobatscope:eqversion:7.0

Trust: 0.6

vendor:adobemodel:acrobatscope:eqversion:6.0.5

Trust: 0.6

vendor:adobemodel:acrobatscope:eqversion:6.0.4

Trust: 0.6

vendor:adobemodel:acrobatscope:eqversion:6.0.3

Trust: 0.6

vendor:adobemodel:acrobatscope:eqversion:6.0.2

Trust: 0.6

vendor:adobemodel:acrobatscope:eqversion:6.0.1

Trust: 0.6

vendor:adobemodel:acrobatscope:eqversion:6.0

Trust: 0.6

vendor:adobemodel:readerscope:neversion:9.3.3

Trust: 0.6

vendor:adobemodel:acrobat standardscope:neversion:9.3.3

Trust: 0.6

vendor:adobemodel:acrobat professionalscope:neversion:9.3.3

Trust: 0.6

vendor:adobemodel:acrobatscope:neversion:9.3.3

Trust: 0.6

vendor:adobemodel:readerscope:eqversion:9.0

Trust: 0.3

vendor:susemodel:linux enterprise desktop sp1scope:eqversion:11

Trust: 0.3

vendor:susemodel:linux enterprise desktopscope:eqversion:11

Trust: 0.3

vendor:susemodel:linux enterprise desktop sp3scope:eqversion:10

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:11.2

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:11.1

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:11.0

Trust: 0.3

vendor:redhatmodel:enterprise linux ws extrasscope:eqversion:4

Trust: 0.3

vendor:redhatmodel:enterprise linux extrasscope:eqversion:4

Trust: 0.3

vendor:redhatmodel:enterprise linux es extrasscope:eqversion:4

Trust: 0.3

vendor:redhatmodel:enterprise linux as extrasscope:eqversion:4

Trust: 0.3

vendor:redhatmodel:desktop extrasscope:eqversion:4

Trust: 0.3

vendor:redmodel:hat enterprise linux supplementary serverscope:eqversion:5

Trust: 0.3

vendor:redmodel:hat enterprise linux desktop supplementary clientscope:eqversion:5

Trust: 0.3

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:9

Trust: 0.3

vendor:adobe incorporatedmodel:readerscope:eqversion:9.3.1 and 9.3.2

Trust: 0.1

sources: ZSL: ZSL-2010-4943 // CERT/CC: VU#486225 // BID: 41130 // BID: 41231 // JVNDB: JVNDB-2010-001710 // CNNVD: CNNVD-201006-482 // NVD: CVE-2010-2204

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2010-2204
value: HIGH

Trust: 1.0

CARNEGIE MELLON: VU#486225
value: HIGH

Trust: 0.8

NVD: CVE-2010-2204
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201006-482
value: CRITICAL

Trust: 0.6

ZSL: ZSL-2010-4943
value: (4/5)

Trust: 0.1

VULHUB: VHN-44809
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2010-2204
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CARNEGIE MELLON: VU#486225
severity: HIGH
baseScore: 9.0
vectorString: NONE
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 9.5
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-44809
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: ZSL: ZSL-2010-4943 // CERT/CC: VU#486225 // VULHUB: VHN-44809 // JVNDB: JVNDB-2010-001710 // CNNVD: CNNVD-201006-482 // NVD: CVE-2010-2204

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

sources: NVD: CVE-2010-2204

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 90516 // CNNVD: CNNVD-201006-482

TYPE

lack of information

Trust: 0.6

sources: CNNVD: CNNVD-201006-482

CONFIGURATIONS

sources: JVNDB: JVNDB-2010-001710

EXPLOIT AVAILABILITY

sources: ZSL: ZSL-2010-4943 // CERT/CC: VU#486225 // VULHUB: VHN-44809

PATCH

title:APSB10-15url:http://www.adobe.com/support/security/bulletins/apsb10-15.html

Trust: 0.8

title:APSB10-15url:http://www.adobe.com/jp/support/security/bulletins/apsb10-15.html

Trust: 0.8

title:RHSA-2010:0503url:https://rhn.redhat.com/errata/RHSA-2010-0503.html

Trust: 0.8

title:TA10-159Aurl:http://software.fujitsu.com/jp/security/vulnerabilities/ta10-159a.html

Trust: 0.8

title:TA10-162Aurl:http://software.fujitsu.com/jp/security/vulnerabilities/ta10-162a.html

Trust: 0.8

sources: JVNDB: JVNDB-2010-001710

EXTERNAL IDS

db:NVDid:CVE-2010-2204

Trust: 3.0

db:BIDid:41231

Trust: 2.3

db:VUPENid:ADV-2010-1636

Trust: 2.0

db:SECTRACKid:1024159

Trust: 1.2

db:SECUNIAid:40026

Trust: 0.9

db:CERT/CCid:VU#486225

Trust: 0.9

db:USCERTid:TA10-159A

Trust: 0.9

db:USCERTid:SA10-162A

Trust: 0.8

db:USCERTid:TA10-162A

Trust: 0.8

db:USCERTid:SA10-159A

Trust: 0.8

db:JVNDBid:JVNDB-2010-001710

Trust: 0.8

db:CNNVDid:CNNVD-201006-482

Trust: 0.7

db:ZSLid:ZSL-2010-4943

Trust: 0.5

db:BIDid:41130

Trust: 0.4

db:EXPLOIT-DBid:14121

Trust: 0.2

db:SECUNIAid:40034

Trust: 0.2

db:AUSCERTid:ESB-2010.0583

Trust: 0.1

db:OSVDBid:65915

Trust: 0.1

db:PACKETSTORMid:91308

Trust: 0.1

db:SEEBUGid:SSVID-69210

Trust: 0.1

db:VULHUBid:VHN-44809

Trust: 0.1

db:PACKETSTORMid:93607

Trust: 0.1

db:PACKETSTORMid:90322

Trust: 0.1

db:PACKETSTORMid:90516

Trust: 0.1

db:PACKETSTORMid:90321

Trust: 0.1

sources: ZSL: ZSL-2010-4943 // CERT/CC: VU#486225 // VULHUB: VHN-44809 // BID: 41130 // BID: 41231 // JVNDB: JVNDB-2010-001710 // PACKETSTORM: 93607 // PACKETSTORM: 90322 // PACKETSTORM: 90516 // PACKETSTORM: 90321 // CNNVD: CNNVD-201006-482 // NVD: CVE-2010-2204

REFERENCES

url:http://www.adobe.com/support/security/bulletins/apsb10-15.html

Trust: 2.1

url:http://www.securityfocus.com/bid/41231

Trust: 2.0

url:http://www.vupen.com/english/advisories/2010/1636

Trust: 2.0

url:http://www.adobe.com/support/security/advisories/apsa10-01.html

Trust: 1.8

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a7242

Trust: 1.1

url:http://www.securitytracker.com/id?1024159

Trust: 1.1

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-2204

Trust: 0.9

url:http://www.adobe.com/support/security/bulletins/apsb10-14.html

Trust: 0.9

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2204

Trust: 0.9

url:http://www.adobe.com/devnet/actionscript/articles/avm2overview.pdf

Trust: 0.8

url:http://labs.adobe.com/technologies/flashplayer10/

Trust: 0.8

url:http://blog.zynamics.com/2010/06/09/analyzing-the-currently-exploited-0-day-for-adobe-reader-and-adobe-flash/

Trust: 0.8

url:http://www.symantec.com/connect/blogs/analysis-zero-day-exploit-adobe-flash-and-reader

Trust: 0.8

url:http://community.websense.com/blogs/securitylabs/archive/2010/06/09/having-fun-with-adobe-0-day-exploits.aspx

Trust: 0.8

url:http://secunia.com/advisories/40026

Trust: 0.8

url:http://www.f-secure.com/weblog/archives/00001962.html

Trust: 0.8

url:http://blogs.technet.com/srd/archive/2009/06/05/understanding-dep-as-a-mitigation-technology-part-1.aspx

Trust: 0.8

url:http://blogs.technet.com/srd/archive/2009/06/12/understanding-dep-as-a-mitigation-technology-part-2.aspx

Trust: 0.8

url:http://www.ipa.go.jp/security/ciadr/vul/20100611-adobe.html

Trust: 0.8

url:https://www.jpcert.or.jp/at/2010/at100015.txt

Trust: 0.8

url:https://www.jpcert.or.jp/at/2010/at100017.txt

Trust: 0.8

url:http://jvn.jp/cert/jvnta10-159a/index.html

Trust: 0.8

url:http://jvn.jp/cert/jvnta10-162a/index.html

Trust: 0.8

url:http://jvn.jp/tr/jvntr-2010-16

Trust: 0.8

url:http://www.us-cert.gov/cas/alerts/sa10-159a.html

Trust: 0.8

url:http://www.us-cert.gov/cas/alerts/sa10-162a.html

Trust: 0.8

url:http://www.us-cert.gov/cas/techalerts/ta10-159a.html

Trust: 0.8

url:http://www.us-cert.gov/cas/techalerts/ta10-162a.html

Trust: 0.8

url:http://www.npa.go.jp/cyberpolice/#topics

Trust: 0.8

url:http://www.adobe.com

Trust: 0.6

url:http://www.zeroscience.mk/en/vulnerabilities/zsl-2010-4943.php

Trust: 0.3

url:http://secunia.com/products/corporate/evm/

Trust: 0.2

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.2

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.2

url:http://secunia.com/vulnerability_scanning/corporate/webinars/

Trust: 0.2

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.2

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.2

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.2

url:http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2010-2204

Trust: 0.1

url:http://www.securityfocus.com/bid/41130

Trust: 0.1

url:http://www.exploit-db.com/exploits/14121/

Trust: 0.1

url:http://securitytracker.com/alerts/2010/jun/1024159.html

Trust: 0.1

url:http://www.packetstormsecurity.org/filedesc/zsl-2010-4943.txt.html

Trust: 0.1

url:http://securityreason.com/exploitalert/8377

Trust: 0.1

url:http://secunia.com/advisories/40034

Trust: 0.1

url:http://www.auscert.org.au/render.html?it=13010

Trust: 0.1

url:http://www.juniper.net/security/auto/vulnerabilities/vuln41231.html

Trust: 0.1

url:http://tools.cisco.com/security/center/viewalert.x?alertid=20787

Trust: 0.1

url:https://rhn.redhat.com/errata/rhsa-2010-0503.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2010-2204.html

Trust: 0.1

url:http://www.scip.ch/?nasldb.47164

Trust: 0.1

url:http://www.cpni.gov.uk/products/alerts/3949.aspx

Trust: 0.1

url:http://www.alertra.com/security-checks.php?id=47165

Trust: 0.1

url:http://osvdb.org/show/osvdb/65915

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2203

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-4324

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2209

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-0188

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-0194

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-0202

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0194

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-0199

Trust: 0.1

url:http://security.gentoo.org/glsa/glsa-201009-05.xml

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2202

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2205

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2206

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-0203

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0197

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2211

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-1285

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0199

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-0192

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0186

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0190

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-0196

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-3953

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-4324

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0191

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0202

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0204

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-0201

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2210

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-0197

Trust: 0.1

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0188

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0198

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-0191

Trust: 0.1

url:http://www.adobe.com/support/security/bulletins/apsb10-07.html

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-1297

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-1241

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-1295

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0192

Trust: 0.1

url:http://security.gentoo.org/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-3953

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0203

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2208

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-0190

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0193

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-0198

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2207

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0195

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-0204

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2168

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0201

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0196

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2201

Trust: 0.1

url:http://www.adobe.com/support/security/bulletins/apsb10-09.html

Trust: 0.1

url:http://www.adobe.com/support/security/bulletins/apsb10-02.html

Trust: 0.1

url:http://www.adobe.com/support/security/bulletins/apsb10-16.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-0193

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-0186

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-0195

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2212

Trust: 0.1

url:http://secunia.com/advisories/40026/#comments

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=40026

Trust: 0.1

url:http://secunia.com/advisories/40026/

Trust: 0.1

url:http://www.adobe.com/support/security/advisories/apsa10-01.html>

Trust: 0.1

url:http://www.kb.cert.org/vuls/id/486225>

Trust: 0.1

url:http://www.us-cert.gov/cas/techalerts/ta10-159a.html>

Trust: 0.1

url:http://www.us-cert.gov/legal.html>

Trust: 0.1

url:http://blogs.technet.com/b/srd/archive/2009/06/12/understanding-dep-as-a-mitigation-technology-part-2.aspx>

Trust: 0.1

url:http://labs.adobe.com/technologies/flashplayer10/>

Trust: 0.1

url:http://www.us-cert.gov/reading_room/securing_browser/>

Trust: 0.1

url:http://www.us-cert.gov/cas/signup.html>.

Trust: 0.1

url:http://blogs.technet.com/b/srd/archive/2009/06/05/understanding-dep-as-a-mitigation-technology-part-1.aspx>

Trust: 0.1

url:http://secunia.com/advisories/40034/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=40034

Trust: 0.1

url:http://secunia.com/advisories/40034/#comments

Trust: 0.1

sources: ZSL: ZSL-2010-4943 // CERT/CC: VU#486225 // VULHUB: VHN-44809 // BID: 41130 // BID: 41231 // JVNDB: JVNDB-2010-001710 // PACKETSTORM: 93607 // PACKETSTORM: 90322 // PACKETSTORM: 90516 // PACKETSTORM: 90321 // CNNVD: CNNVD-201006-482 // NVD: CVE-2010-2204

CREDITS

Gjoko 'LiquidWorm' Krstic

Trust: 0.6

sources: CNNVD: CNNVD-201006-482

SOURCES

db:ZSLid:ZSL-2010-4943
db:CERT/CCid:VU#486225
db:VULHUBid:VHN-44809
db:BIDid:41130
db:BIDid:41231
db:JVNDBid:JVNDB-2010-001710
db:PACKETSTORMid:93607
db:PACKETSTORMid:90322
db:PACKETSTORMid:90516
db:PACKETSTORMid:90321
db:CNNVDid:CNNVD-201006-482
db:NVDid:CVE-2010-2204

LAST UPDATE DATE

2024-11-23T19:53:51.577000+00:00


SOURCES UPDATE DATE

db:ZSLid:ZSL-2010-4943date:2010-07-02T00:00:00
db:CERT/CCid:VU#486225date:2012-03-28T00:00:00
db:VULHUBid:VHN-44809date:2018-10-30T00:00:00
db:BIDid:41130date:2010-06-29T22:08:00
db:BIDid:41231date:2015-03-19T09:15:00
db:JVNDBid:JVNDB-2010-001710date:2010-07-21T00:00:00
db:CNNVDid:CNNVD-201006-482date:2010-07-02T00:00:00
db:NVDid:CVE-2010-2204date:2024-11-21T01:16:08.943

SOURCES RELEASE DATE

db:ZSLid:ZSL-2010-4943date:2010-06-29T00:00:00
db:CERT/CCid:VU#486225date:2010-06-07T00:00:00
db:VULHUBid:VHN-44809date:2010-06-30T00:00:00
db:BIDid:41130date:2010-06-24T00:00:00
db:BIDid:41231date:2010-06-29T00:00:00
db:JVNDBid:JVNDB-2010-001710date:2010-07-21T00:00:00
db:PACKETSTORMid:93607date:2010-09-08T05:23:46
db:PACKETSTORMid:90322date:2010-06-07T11:14:28
db:PACKETSTORMid:90516date:2010-06-12T04:47:27
db:PACKETSTORMid:90321date:2010-06-07T11:14:25
db:CNNVDid:CNNVD-201006-482date:2010-06-29T00:00:00
db:NVDid:CVE-2010-2204date:2010-06-30T18:30:01.613