ID

VAR-201009-0241


CVE

CVE-2010-2884


TITLE

Adobe Flash unspecified code execution vulnerability

Trust: 0.8

sources: CERT/CC: VU#275289

DESCRIPTION

Adobe Flash Player 10.1.82.76 and earlier on Windows, Mac OS X, Linux, and Solaris and 10.1.92.10 on Android; authplay.dll in Adobe Reader and Acrobat 9.x before 9.4; and authplay.dll in Adobe Reader and Acrobat 8.x before 8.2.5 on Windows and Mac OS X allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, as exploited in the wild in September 2010. Adobe Flash Contains a vulnerability. Attack activity using this vulnerability has been confirmed.Crafted Flash By browsing a document with embedded content, arbitrary code may be executed. Failed attacks may cause denial-of-service conditions. The product enables viewing of applications, content and video across screens and browsers. Background ========== The Adobe Flash Player is a renderer for the SWF file format, which is commonly used to provide interactive websites. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201101-08 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: Adobe Reader: Multiple vulnerabilities Date: January 21, 2011 Bugs: #336508, #343091 ID: 201101-08 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities in Adobe Reader might result in the execution of arbitrary code. Background ========== Adobe Reader (formerly Adobe Acrobat Reader) is a closed-source PDF reader. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 app-text/acroread < 9.4.1 >= 9.4.1 Description =========== Multiple vulnerabilities were discovered in Adobe Reader. For further information please consult the CVE entries and the Adobe Security Bulletins referenced below. Workaround ========== There is no known workaround at this time. Resolution ========== All Adobe Reader users should upgrade to the latest stable version: # emerge --sync # emerge --ask --oneshot --verbose ">=app-text/acroread-9.4.1" References ========== [ 1 ] APSB10-21 http://www.adobe.com/support/security/bulletins/apsb10-21.html [ 2 ] APSB10-28 http://www.adobe.com/support/security/bulletins/apsb10-28.html [ 3 ] CVE-2010-2883 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2883 [ 4 ] CVE-2010-2884 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2884 [ 5 ] CVE-2010-2887 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2887 [ 6 ] CVE-2010-2889 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2889 [ 7 ] CVE-2010-2890 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2890 [ 8 ] CVE-2010-3619 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3619 [ 9 ] CVE-2010-3620 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3620 [ 10 ] CVE-2010-3621 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3621 [ 11 ] CVE-2010-3622 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3622 [ 12 ] CVE-2010-3625 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3625 [ 13 ] CVE-2010-3626 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3626 [ 14 ] CVE-2010-3627 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3627 [ 15 ] CVE-2010-3628 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3628 [ 16 ] CVE-2010-3629 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3629 [ 17 ] CVE-2010-3630 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3630 [ 18 ] CVE-2010-3632 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3632 [ 19 ] CVE-2010-3654 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3654 [ 20 ] CVE-2010-3656 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3656 [ 21 ] CVE-2010-3657 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3657 [ 22 ] CVE-2010-3658 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3658 [ 23 ] CVE-2010-4091 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4091 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-201101-08.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2011 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5

Trust: 2.88

sources: NVD: CVE-2010-2884 // CERT/CC: VU#275289 // JVNDB: JVNDB-2010-002089 // BID: 43205 // VULHUB: VHN-45489 // PACKETSTORM: 97735 // PACKETSTORM: 97734

AFFECTED PRODUCTS

vendor:adobemodel:acrobatscope:lteversion:9.3.4

Trust: 1.8

vendor:adobemodel:acrobat readerscope:eqversion:5.0.6

Trust: 1.6

vendor:adobemodel:acrobat readerscope:eqversion:5.0.10

Trust: 1.6

vendor:adobemodel:acrobat readerscope:eqversion:9.3.3

Trust: 1.6

vendor:adobemodel:acrobat readerscope:eqversion:5.0

Trust: 1.6

vendor:adobemodel:acrobat readerscope:eqversion:5.0.11

Trust: 1.6

vendor:adobemodel:acrobat readerscope:eqversion:5.0.9

Trust: 1.6

vendor:adobemodel:acrobat readerscope:eqversion:7.0.6

Trust: 1.6

vendor:adobemodel:acrobat readerscope:eqversion:5.0.5

Trust: 1.6

vendor:adobemodel:acrobat readerscope:eqversion:5.0.7

Trust: 1.6

vendor:adobemodel:acrobat readerscope:eqversion:8.0

Trust: 1.6

vendor:adobemodel:acrobatscope:eqversion:7.0.1

Trust: 1.3

vendor:adobemodel:acrobatscope:eqversion:8.2.3

Trust: 1.3

vendor:adobemodel:acrobatscope:eqversion:7.0.3

Trust: 1.3

vendor:adobemodel:acrobatscope:eqversion:8.2.2

Trust: 1.3

vendor:adobemodel:acrobatscope:eqversion:9.3.1

Trust: 1.3

vendor:adobemodel:acrobatscope:eqversion:9.3

Trust: 1.3

vendor:adobemodel:flash playerscope:eqversion:10.0.32.18

Trust: 1.3

vendor:adobemodel:acrobatscope:eqversion:9.1.1

Trust: 1.3

vendor:adobemodel:flash playerscope:eqversion:10.0.12.36

Trust: 1.3

vendor:adobemodel:acrobatscope:eqversion:7.1.2

Trust: 1.3

vendor:adobemodel:flash playerscope:eqversion:10.0.22.87

Trust: 1.3

vendor:adobemodel:acrobatscope:eqversion:7.0

Trust: 1.3

vendor:adobemodel:flash playerscope:eqversion:10.0.15.3

Trust: 1.3

vendor:adobemodel:acrobatscope:eqversion:7.0.9

Trust: 1.3

vendor:adobemodel:acrobatscope:eqversion:9.2

Trust: 1.3

vendor:adobemodel:flash playerscope:eqversion:10.0.42.34

Trust: 1.3

vendor:adobemodel:acrobatscope:eqversion:9.3.3

Trust: 1.3

vendor:adobemodel:acrobatscope:eqversion:9.3.2

Trust: 1.3

vendor:adobemodel:acrobatscope:eqversion:7.0.2

Trust: 1.3

vendor:adobemodel:acrobat readerscope:eqversion:8.2.3

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:5.0.10

Trust: 1.0

vendor:adobemodel:flash playerscope:eqversion:7.1

Trust: 1.0

vendor:adobemodel:flash playerscope:eqversion:8.0.24.0

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:6.0.3

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:3.01

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:7.0.7

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:6.0.2

Trust: 1.0

vendor:adobemodel:flash playerscope:eqversion:9.0.20

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:9.1

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:7.0.5

Trust: 1.0

vendor:adobemodel:flash playerscope:eqversion:8.0.34.0

Trust: 1.0

vendor:adobemodel:flash playerscope:eqversion:7.2

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:7.1.1

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:6.0.3

Trust: 1.0

vendor:adobemodel:flash playerscope:eqversion:9.0.16

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:8.1.5

Trust: 1.0

vendor:adobemodel:flash playerscope:eqversion:9.0.159.0

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:8.1.1

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.0.7

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:8.0

Trust: 1.0

vendor:adobemodel:flash playerscope:eqversion:8.0

Trust: 1.0

vendor:adobemodel:flash playerscope:lteversion:10.1.82.76

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:6.0.2

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:8.2.2

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:6.0.4

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:9.1

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:7.0.8

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.0.5

Trust: 1.0

vendor:adobemodel:flash playerscope:eqversion:9.0.28.0

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:9.1.1

Trust: 1.0

vendor:adobemodel:flash playerscope:eqversion:9.0.47.0

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:8.1.5

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:8.2

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:8.1.1

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:9.2

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:3.0

Trust: 1.0

vendor:adobemodel:flash playerscope:eqversion:9.0.151.0

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:9.3.1

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:8.1.6

Trust: 1.0

vendor:adobemodel:flash playerscope:eqversion:9.0.112.0

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:7.0.6

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:6.0.4

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.0.8

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:7.1.4

Trust: 1.0

vendor:adobemodel:flash playerscope:eqversion:10.0.0.584

Trust: 1.0

vendor:adobemodel:flash playerscope:eqversion:9.0.125.0

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:9.0

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:8.1

Trust: 1.0

vendor:adobemodel:flash playerscope:lteversion:10.1.92.10

Trust: 1.0

vendor:adobemodel:flash playerscope:eqversion:9.0

Trust: 1.0

vendor:adobemodel:flash playerscope:eqversion:9.0.152.0

Trust: 1.0

vendor:adobemodel:flash playerscope:eqversion:9.0.124.0

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:8.2

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:5.1

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:3.0

Trust: 1.0

vendor:adobemodel:flash playerscope:eqversion:9.0.260.0

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:4.5

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:9.1.2

Trust: 1.0

vendor:adobemodel:flash playerscope:eqversion:9.0.31

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:8.1.6

Trust: 1.0

vendor:adobemodel:flash playerscope:eqversion:7.0.70.0

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:4.0.5

Trust: 1.0

vendor:adobemodel:flash playerscope:eqversion:7.0.69.0

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:9.0

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:8.1

Trust: 1.0

vendor:adobemodel:flash playerscope:eqversion:7.0.1

Trust: 1.0

vendor:adobemodel:flash playerscope:eqversion:9.0.115.0

Trust: 1.0

vendor:adobemodel:flash playerscope:eqversion:9.0.31.0

Trust: 1.0

vendor:adobemodel:flash playerscope:eqversion:9.0.48.0

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:9.1.2

Trust: 1.0

vendor:adobemodel:flash playerscope:eqversion:8.0.33.0

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:5.0.6

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:4.0.5

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:4.0.5c

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:3.1

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:8.1.3

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:5.0.5

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.0.1

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.0.9

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:8.1.7

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:7.1.0

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.0.3

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:3.02

Trust: 1.0

vendor:adobemodel:flash playerscope:eqversion:8.0.22.0

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:4.0.5c

Trust: 1.0

vendor:adobemodel:flash playerscope:eqversion:9.0.246.0

Trust: 1.0

vendor:adobemodel:flash playerscope:eqversion:9.0.45.0

Trust: 1.0

vendor:adobemodel:acrobat readerscope:lteversion:9.3.4

Trust: 1.0

vendor:adobemodel:flash playerscope:eqversion:7.0.25

Trust: 1.0

vendor:adobemodel:flash playerscope:eqversion:9.0.20.0

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:8.1.7

Trust: 1.0

vendor:adobemodel:flash playerscope:eqversion:8.0.35.0

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.1.0

Trust: 1.0

vendor:adobemodel:flash playerscope:eqversion:10.0.12.10

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:8.1.2

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:6.0.1

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:7.1.3

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:8.1.4

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:4.0.5a

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:7.0.4

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:9.1.3

Trust: 1.0

vendor:adobemodel:flash playerscope:eqversion:9.0.114.0

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:6.0.6

Trust: 1.0

vendor:adobemodel:flash playerscope:eqversion:9.0.18d60

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:8.2.1

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:9.3

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:6.0

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.0.2

Trust: 1.0

vendor:adobemodel:flash playerscope:eqversion:7.0

Trust: 1.0

vendor:adobemodel:flash playerscope:eqversion:7.0.63

Trust: 1.0

vendor:adobemodel:flash playerscope:eqversion:9.125.0

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:4.0

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:8.1.2

Trust: 1.0

vendor:adobemodel:flash playerscope:eqversion:7.1.1

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:6.0.1

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:6.0.5

Trust: 1.0

vendor:adobemodel:flash playerscope:eqversion:9.0.28

Trust: 1.0

vendor:adobemodel:flash playerscope:eqversion:8.0.39.0

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:8.1.4

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:9.3.2

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:4.0.5a

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.0.4

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:9.1.3

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:8.2.1

Trust: 1.0

vendor:adobemodel:flash playerscope:eqversion:8.0.42.0

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:6.0

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.0

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:5.0

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:4.0

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:6.0.5

Trust: 1.0

vendor:adobemodel: - scope: - version: -

Trust: 0.8

vendor:googlemodel: - scope: - version: -

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.5.8

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.6 to v10.6.4

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.5.8

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.6 to v10.6.4

Trust: 0.8

vendor:adobemodel:flash playerscope:lteversion:10.1.82.76 windows edition

Trust: 0.8

vendor:adobemodel:flash playerscope:eqversion:macintosh edition

Trust: 0.8

vendor:adobemodel:flash playerscope:eqversion:linux edition

Trust: 0.8

vendor:adobemodel:flash playerscope:eqversion:solaris edition

Trust: 0.8

vendor:adobemodel:flash playerscope:eqversion:10.1.92.10 android edition

Trust: 0.8

vendor:adobemodel:readerscope:lteversion:9.3.4

Trust: 0.8

vendor:oraclemodel:solarisscope:eqversion:10

Trust: 0.8

vendor:oraclemodel:solarisscope:eqversion:11 express

Trust: 0.8

vendor:red hatmodel:enterprise linux extrasscope:eqversion:3 extras

Trust: 0.8

vendor:red hatmodel:enterprise linux extrasscope:eqversion:4 extras

Trust: 0.8

vendor:red hatmodel:enterprise linux extrasscope:eqversion:4.8.z extras

Trust: 0.8

vendor:red hatmodel:rhel desktop supplementaryscope:eqversion:5 (client)

Trust: 0.8

vendor:red hatmodel:rhel supplementaryscope:eqversion:5 (server)

Trust: 0.8

vendor:adobemodel:acrobat professionalscope:eqversion:8.1.3

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:7.0.1

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.0.12.35

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:7.0.3

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:7.0.6

Trust: 0.3

vendor:susemodel:opensusescope:neversion:11.3

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:8.0

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:7.1.4

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:9.1.2

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:8.2.2

Trust: 0.3

vendor:adobemodel:airscope:eqversion:1.5.2

Trust: 0.3

vendor:susemodel:linux enterprise sp3scope:eqversion:10

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.397.0

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:9.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.391.0

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.6

Trust: 0.3

vendor:adobemodel:acrobatscope:neversion:8.2.5

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.3

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:9.3.3

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:9.3.1

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:9.3

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:7.1.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.398.0

Trust: 0.3

vendor:redhatmodel:enterprise linux ws extrasscope:eqversion:3

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:9.1.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5

Trust: 0.3

vendor:adobemodel:flash playerscope:neversion:10.1.95.1

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:9.3.4

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.1.51.66

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:8.1.6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.47255

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.7

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:9.3.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.4

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:7.0

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:7.0.8

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.381.0

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:7.1.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.2

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:7.0.4

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:8.1.4

Trust: 0.3

vendor:adobemodel:acrobatscope:eqversion:8.2.4

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:8.2.4

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:11.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.394.0

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:7.0.1

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:8.2

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:8.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.4

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:8.0

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:neversion:9.4

Trust: 0.3

vendor:redhatmodel:desktop extrasscope:eqversion:4

Trust: 0.3

vendor:adobemodel:acrobatscope:neversion:9.4

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:9.3.2

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:8.1.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.396.0

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:9.1.2

Trust: 0.3

vendor:s u s emodel:opensusescope:neversion:11.1

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:7.0.2

Trust: 0.3

vendor:adobemodel:airscope:eqversion:2.0.2.12610

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:9.1

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:8.1.3

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:7.0.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:8.1.5

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:7.0.7

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:7.0.6

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:9

Trust: 0.3

vendor:googlemodel:chromescope:neversion:6.0.472.62

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.395.0

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:7.1.4

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:8.2.1

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:8.2.2

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:8.1.7

Trust: 0.3

vendor:redmodel:hat enterprise linux supplementary serverscope:eqversion:5

Trust: 0.3

vendor:redhatmodel:enterprise linux extrasscope:eqversion:4

Trust: 0.3

vendor:redhatmodel:enterprise linux extrasscope:eqversion:3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.1

Trust: 0.3

vendor:susemodel:linux enterprise desktop sp3scope:eqversion:10

Trust: 0.3

vendor:sunmodel:solaris expressscope:eqversion:11

Trust: 0.3

vendor:susemodel:linux enterprise desktopscope:neversion:11

Trust: 0.3

vendor:adobemodel:acrobat standardscope:neversion:8.2.5

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:8.2.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.8

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:7.0.8

Trust: 0.3

vendor:adobemodel:airscope:neversion:2.0.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.385.0

Trust: 0.3

vendor:susemodel:linux enterprise desktop sp3scope:neversion:10

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.5

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:8.2.4

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:8.2

Trust: 0.3

vendor:adobemodel:airscope:eqversion:1.5

Trust: 0.3

vendor:adobemodel:acrobatscope:eqversion:8.1.8

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:9.3.4

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:9.3.2

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:8.1.2

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:7.0.4

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:7.0.5

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:7.0.2

Trust: 0.3

vendor:adobemodel:airscope:eqversion:1.5.3

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:8.1.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.2

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:7.1

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:8.1.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.3

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:7.0.3

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:8.1

Trust: 0.3

vendor:susemodel:moblinscope:eqversion:2.1

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:8.1.1

Trust: 0.3

vendor:adobemodel:acrobat standardscope:neversion:9.4

Trust: 0.3

vendor:redhatmodel:desktop extrasscope:eqversion:3

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:7.1.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.59

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.384.0

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:8.2.2

Trust: 0.3

vendor:susemodel:linux enterprise desktopscope:eqversion:11

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.0.3218

Trust: 0.3

vendor:adobemodel:airscope:eqversion:1.5.1

Trust: 0.3

vendor:adobemodel:acrobat professional security updatscope:eqversion:8.1.2

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:7.0.9

Trust: 0.3

vendor:susemodel:linux enterprise sp1scope:eqversion:11

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.1.53.64

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:9.1

Trust: 0.3

vendor:redhatmodel:enterprise linux es extrasscope:eqversion:4

Trust: 0.3

vendor:redhatmodel:enterprise linux es extrasscope:eqversion:3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.390.0

Trust: 0.3

vendor:adobemodel:readerscope:neversion:8.2.5

Trust: 0.3

vendor:adobemodel:airscope:eqversion:1.5.3.9130

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.6

Trust: 0.3

vendor:susemodel:linux enterprisescope:eqversion:11

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.3

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:7.0.7

Trust: 0.3

vendor:adobemodel:airscope:eqversion:1.5.3.9120

Trust: 0.3

vendor:sunmodel:solaris 10 sparcscope: - version: -

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:9

Trust: 0.3

vendor:applemodel:mac os serverscope:neversion:x10.6.5

Trust: 0.3

vendor:adobemodel:reader security updatscope:eqversion:8.1.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.382.0

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:8.2.1

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:8.1.7

Trust: 0.3

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:9.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:9.3.1

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:9.3.3

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:7.0.4

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:9.3

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:7.0.8

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.4

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:8.1.4

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:7.1.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.378.0

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:9.1.3

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:8.1

Trust: 0.3

vendor:s u s emodel:opensusescope:neversion:11.2

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:9.1.1

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.1.82.76

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:8.1.6

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.7

Trust: 0.3

vendor:adobemodel:readerscope:neversion:9.4

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:7.1.1

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:9.3.2

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:7.0.5

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:7.0

Trust: 0.3

vendor:adobemodel:flash playerscope:neversion:10.1.85.3

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:7.1

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.0.452

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:9.1

Trust: 0.3

vendor:adobemodel:airscope:eqversion:2.0.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.387.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.393.0

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:8.1.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.382.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.4

Trust: 0.3

vendor:susemodel:moblinscope:eqversion:2.0

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:7.0.1

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:7.0.7

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:9

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.386.0

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:8.0

Trust: 0.3

vendor:susemodel:linux enterprise desktop sp1scope:eqversion:11

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:7.1.2

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:8.2.1

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:8.1.7

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:9.1.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.1

Trust: 0.3

vendor:susemodel:linux enterprise desktop sp1scope:neversion:11

Trust: 0.3

vendor:sunmodel:solaris 10 x86scope: - version: -

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:neversion:8.2.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.392.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.380.0

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:7.0.6

Trust: 0.3

vendor:redmodel:hat enterprise linux desktop supplementary clientscope:eqversion:5

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:9.3.1

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:9.3

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:9.2

Trust: 0.3

vendor:redhatmodel:enterprise linux ws extrasscope:eqversion:4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.53

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.5

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:9.1.3

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:8.1.6

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.8

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:11.2

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:7.1.1

Trust: 0.3

vendor:redhatmodel:enterprise linux as extrasscope:eqversion:4

Trust: 0.3

vendor:redhatmodel:enterprise linux as extrasscope:eqversion:3

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:7.0.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.383.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.376.0

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:7.1

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:7.1.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.2

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:8.1.1

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:8.2.4

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:8.2

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:10.1.92.10

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:9.3.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.379.0

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:8.1.2

Trust: 0.3

vendor:adobemodel:acrobat standardscope:eqversion:7.0

Trust: 0.3

vendor:susemodel:opensusescope:eqversion:11.3

Trust: 0.3

vendor:adobemodel:acrobat professionalscope:eqversion:7.0.2

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:7.0.9

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.3

Trust: 0.3

sources: CERT/CC: VU#275289 // BID: 43205 // JVNDB: JVNDB-2010-002089 // CNNVD: CNNVD-201009-136 // NVD: CVE-2010-2884

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2010-2884
value: HIGH

Trust: 1.0

CARNEGIE MELLON: VU#275289
value: 31.59

Trust: 0.8

NVD: CVE-2010-2884
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201009-136
value: CRITICAL

Trust: 0.6

VULHUB: VHN-45489
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2010-2884
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-45489
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#275289 // VULHUB: VHN-45489 // JVNDB: JVNDB-2010-002089 // CNNVD: CNNVD-201009-136 // NVD: CVE-2010-2884

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

sources: NVD: CVE-2010-2884

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 97735 // CNNVD: CNNVD-201009-136

TYPE

lack of information

Trust: 0.6

sources: CNNVD: CNNVD-201009-136

CONFIGURATIONS

sources: JVNDB: JVNDB-2010-002089

PATCH

title:APSA10-03url:http://www.adobe.com/support/security/advisories/apsa10-03.html

Trust: 0.8

title:APSB10-22url:http://www.adobe.com/support/security/bulletins/apsb10-22.html

Trust: 0.8

title:APSB10-21url:http://www.adobe.com/support/security/bulletins/apsb10-21.html

Trust: 0.8

title:cpsid_86695url:http://kb2.adobe.com/jp/cps/866/cpsid_86695.html

Trust: 0.8

title:APSB10-21url:http://www.adobe.com/jp/support/security/bulletins/apsb10-21.html

Trust: 0.8

title:cpsid_86922url:http://kb2.adobe.com/jp/cps/869/cpsid_86922.html

Trust: 0.8

title:APSB10-22url:http://www.adobe.com/jp/support/security/bulletins/apsb10-22.html

Trust: 0.8

title:APSA10-03url:http://www.adobe.com/jp/support/security/advisories/apsa10-03.html

Trust: 0.8

title:HT4435url:http://support.apple.com/kb/HT4435

Trust: 0.8

title:HT4435url:http://support.apple.com/kb/HT4435?viewlocale=ja_JP

Trust: 0.8

title:RHSA-2010:0743url:https://rhn.redhat.com/errata/RHSA-2010-0743.html

Trust: 0.8

title:RHSA-2010:0706url:https://rhn.redhat.com/errata/RHSA-2010-0706.html

Trust: 0.8

title:cve_2010_2884_vulnerability_inurl:http://blogs.sun.com/security/entry/cve_2010_2884_vulnerability_in

Trust: 0.8

title:TA10-279Aurl:http://software.fujitsu.com/jp/security/vulnerabilities/ta10-279a.html

Trust: 0.8

title:TA10-263Aurl:http://software.fujitsu.com/jp/security/vulnerabilities/ta10-263a.html

Trust: 0.8

sources: JVNDB: JVNDB-2010-002089

EXTERNAL IDS

db:CERT/CCid:VU#275289

Trust: 3.0

db:NVDid:CVE-2010-2884

Trust: 3.0

db:SECUNIAid:41435

Trust: 2.5

db:SECUNIAid:41443

Trust: 2.5

db:SECUNIAid:41434

Trust: 2.5

db:VUPENid:ADV-2010-2348

Trust: 2.5

db:VUPENid:ADV-2010-2349

Trust: 2.5

db:USCERTid:TA10-279A

Trust: 1.9

db:USCERTid:TA10-263A

Trust: 1.9

db:XFid:61771

Trust: 1.4

db:SECUNIAid:43025

Trust: 1.1

db:SECUNIAid:41526

Trust: 1.1

db:SECUNIAid:43026

Trust: 1.1

db:VUPENid:ADV-2011-0192

Trust: 1.1

db:VUPENid:ADV-2011-0191

Trust: 1.1

db:USCERTid:SA10-263A

Trust: 0.8

db:USCERTid:SA10-279A

Trust: 0.8

db:VUPENid:ADV-2010-2573

Trust: 0.8

db:JVNDBid:JVNDB-2010-002089

Trust: 0.8

db:CNNVDid:CNNVD-201009-136

Trust: 0.7

db:BIDid:43205

Trust: 0.4

db:VULHUBid:VHN-45489

Trust: 0.1

db:PACKETSTORMid:97735

Trust: 0.1

db:PACKETSTORMid:97734

Trust: 0.1

sources: CERT/CC: VU#275289 // VULHUB: VHN-45489 // BID: 43205 // JVNDB: JVNDB-2010-002089 // PACKETSTORM: 97735 // PACKETSTORM: 97734 // CNNVD: CNNVD-201009-136 // NVD: CVE-2010-2884

REFERENCES

url:http://www.adobe.com/support/security/advisories/apsa10-03.html

Trust: 2.8

url:http://secunia.com/advisories/41434

Trust: 2.5

url:http://secunia.com/advisories/41435

Trust: 2.5

url:http://secunia.com/advisories/41443

Trust: 2.5

url:http://www.vupen.com/english/advisories/2010/2348

Trust: 2.5

url:http://www.vupen.com/english/advisories/2010/2349

Trust: 2.5

url:http://www.kb.cert.org/vuls/id/275289

Trust: 2.2

url:http://www.us-cert.gov/cas/techalerts/ta10-263a.html

Trust: 1.9

url:http://www.us-cert.gov/cas/techalerts/ta10-279a.html

Trust: 1.9

url:http://www.adobe.com/support/security/bulletins/apsb10-21.html

Trust: 1.8

url:http://blogs.adobe.com/psirt/2010/09/security-advisory-for-adobe-flash-player-apsa10-03.html

Trust: 1.6

url:http://www.npa.go.jp/cyberpolice/#topics

Trust: 1.6

url:http://www.adobe.com/support/security/bulletins/apsb10-22.html

Trust: 1.5

url:http://xforce.iss.net/xforce/xfdb/61771

Trust: 1.4

url:http://security.gentoo.org/glsa/glsa-201101-08.xml

Trust: 1.2

url:http://security.gentoo.org/glsa/glsa-201101-09.xml

Trust: 1.2

url:http://lists.apple.com/archives/security-announce/2010//nov/msg00000.html

Trust: 1.1

url:http://support.apple.com/kb/ht4435

Trust: 1.1

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a6852

Trust: 1.1

url:http://www.redhat.com/support/errata/rhsa-2010-0706.html

Trust: 1.1

url:http://www.redhat.com/support/errata/rhsa-2010-0743.html

Trust: 1.1

url:http://secunia.com/advisories/41526

Trust: 1.1

url:http://secunia.com/advisories/43025

Trust: 1.1

url:http://secunia.com/advisories/43026

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00001.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html

Trust: 1.1

url:http://www.vupen.com/english/advisories/2011/0191

Trust: 1.1

url:http://www.vupen.com/english/advisories/2011/0192

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/61771

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2884

Trust: 1.0

url:http://www.ipa.go.jp/security/ciadr/vul/20100921-adobe.html

Trust: 0.8

url:http://www.ipa.go.jp/security/ciadr/vul/20101006-adobe.html

Trust: 0.8

url:http://www.jpcert.or.jp/at/2010/at100024.txt

Trust: 0.8

url:http://www.jpcert.or.jp/at/2010/at100026.txt

Trust: 0.8

url:http://jvn.jp/cert/jvnvu275289

Trust: 0.8

url:http://jvn.jp/tr/jvntr-2010-25

Trust: 0.8

url:http://jvn.jp/cert/jvnta10-279a

Trust: 0.8

url:http://jvn.jp/cert/jvnvu331391

Trust: 0.8

url:http://jvn.jp/cert/jvnta10-263a

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-2884

Trust: 0.8

url:http://www.us-cert.gov/cas/alerts/sa10-279a.html

Trust: 0.8

url:http://www.us-cert.gov/cas/alerts/sa10-263a.html

Trust: 0.8

url:http://www.vupen.com/english/advisories/2010/2573

Trust: 0.8

url:http://www.adobe.com/products/flash/

Trust: 0.3

url:http://www.adobe.com

Trust: 0.3

url:http://blogs.sun.com/security/entry/cve_2010_2884_vulnerability_in

Trust: 0.3

url:http://googlechromereleases.blogspot.com/2010/09/stable-beta-channel-updates_17.html

Trust: 0.3

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3654

Trust: 0.2

url:http://security.gentoo.org/

Trust: 0.2

url:https://bugs.gentoo.org.

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2010-2182

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3639

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2181

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2161

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0187

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2174

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3644

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-2166

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2215

Trust: 0.1

url:http://www.adobe.com/support/security/bulletins/apsb10-14.html

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2176

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-2171

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2162

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-2160

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-2181

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-4546

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-4546

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-1297

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-2163

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-2180

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2171

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2180

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-2176

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-2164

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2179

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2169

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3648

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2164

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-0187

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2163

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-0209

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2173

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-1297

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-3793

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2177

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3645

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-2179

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-2165

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-2172

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3976

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2216

Trust: 0.1

url:http://www.adobe.com/support/security/bulletins/apsb10-16.html

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3647

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-2173

Trust: 0.1

url:http://www.adobe.com/support/security/bulletins/apsb10-06.html

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2172

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-3793

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2160

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2213

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2186

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2184

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0186

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2167

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3646

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-2169

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2175

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2214

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2178

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2165

Trust: 0.1

url:http://www.adobe.com/support/security/bulletins/apsb10-26.html

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2188

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2189

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3643

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-2161

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-0186

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3636

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0209

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2166

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3641

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2185

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-2174

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3650

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2183

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-2178

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-2170

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-2177

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3652

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-2162

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3640

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2170

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-2175

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2187

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3649

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-2167

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2182

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3642

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2890

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3620

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-3656

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-3621

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-3619

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-2889

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-2883

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-2890

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3629

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-3629

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3619

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-3625

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-4091

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-3628

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2883

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3625

Trust: 0.1

url:http://www.adobe.com/support/security/bulletins/apsb10-28.html

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3626

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-3657

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3657

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3622

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3658

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3627

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-2884

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-3620

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-3632

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-3654

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3632

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2889

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-3622

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3656

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-2887

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3621

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3628

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-3626

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-3627

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-3658

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2887

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-4091

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-3630

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3630

Trust: 0.1

sources: CERT/CC: VU#275289 // VULHUB: VHN-45489 // BID: 43205 // JVNDB: JVNDB-2010-002089 // PACKETSTORM: 97735 // PACKETSTORM: 97734 // CNNVD: CNNVD-201009-136 // NVD: CVE-2010-2884

CREDITS

Steven Adair of the Shadowserver Foundation

Trust: 0.3

sources: BID: 43205

SOURCES

db:CERT/CCid:VU#275289
db:VULHUBid:VHN-45489
db:BIDid:43205
db:JVNDBid:JVNDB-2010-002089
db:PACKETSTORMid:97735
db:PACKETSTORMid:97734
db:CNNVDid:CNNVD-201009-136
db:NVDid:CVE-2010-2884

LAST UPDATE DATE

2024-11-23T19:33:05.155000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#275289date:2010-09-21T00:00:00
db:VULHUBid:VHN-45489date:2018-10-30T00:00:00
db:BIDid:43205date:2015-03-19T08:37:00
db:JVNDBid:JVNDB-2010-002089date:2010-12-21T00:00:00
db:CNNVDid:CNNVD-201009-136date:2011-07-11T00:00:00
db:NVDid:CVE-2010-2884date:2024-11-21T01:17:33.803

SOURCES RELEASE DATE

db:CERT/CCid:VU#275289date:2010-09-14T00:00:00
db:VULHUBid:VHN-45489date:2010-09-15T00:00:00
db:BIDid:43205date:2010-09-13T00:00:00
db:JVNDBid:JVNDB-2010-002089date:2010-10-05T00:00:00
db:PACKETSTORMid:97735date:2011-01-21T21:15:05
db:PACKETSTORMid:97734date:2011-01-21T21:14:13
db:CNNVDid:CNNVD-201009-136date:2010-09-17T00:00:00
db:NVDid:CVE-2010-2884date:2010-09-15T18:00:44.073