ID

VAR-201106-0116


CVE

CVE-2011-2093


TITLE

plural Adobe Service disruption in products (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2011-001778

DESCRIPTION

Adobe LiveCycle Data Services 3.1 and earlier, LiveCycle 9.0.0.2 and earlier, and BlazeDS 4.0.1 and earlier do not properly handle object graphs, which allows attackers to cause a denial of service via unspecified vectors, related to a "complex object graph vulnerability.". (DoS) There is a vulnerability that becomes a condition.Denial of service by attacker (DoS) There is a possibility of being put into a state. Adobe LiveCycle Data Services and BlazeDS are prone to a remote denial-of-service vulnerability. Remote attackers can exploit this issue to crash the affected applications, denying service to legitimate users. ---------------------------------------------------------------------- Join Secunia @ FIRST Conference, 12-17 June, Hilton Vienna, Austria See to the presentation "The Dynamics and Threats of End-Point Software Portfolios" by Secunia's Research Analyst Director, Stefan Frei. Read more: http://conference.first.org/ ---------------------------------------------------------------------- TITLE: Adobe LiveCycle / BlazeDS Two Vulnerabilities SECUNIA ADVISORY ID: SA44922 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/44922/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=44922 RELEASE DATE: 2011-06-15 DISCUSS ADVISORY: http://secunia.com/advisories/44922/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/44922/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=44922 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: Two vulnerabilities have been reported in Adobe LiveCycle and BlazeDS, which can be exploited by malicious people to cause a DoS (Denial of Service) and compromise a vulnerable system. 1) An error when handling AMF/AMFX data during object deserialization can be exploited to execute certain class methods. Successful exploitation may allow execution of arbitrary code. 2) An error when processing certain graph objects (e.g. JFrame class) can be exploited to cause a DoS. The vulnerabilities are reported in the following products: * LiveCycle Data Services 3.1, 2.6.1, 2.5.1, and earlier for Windows, Macintosh, and UNIX. * LiveCycle 9.0.0.2, 8.2.1.3, 8.0.1.3, and earlier for Windows, Linux, and UNIX. * BlazeDS 4.0.1 and earlier. SOLUTION: Apply updates (please see the vendor's advisory for details). PROVIDED AND/OR DISCOVERED BY: Wouter Coekaerts ORIGINAL ADVISORY: Adobe (APSB11-15): http://www.adobe.com/support/security/bulletins/apsb11-15.html Wouter Coekaerts: http://wouter.coekaerts.be/2011/amf-arbitrary-code-execution OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . 1) The administrative interface allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. This can be exploited to e.g. add a user with administrative privileges by tricking the logged in administrator into visiting a malicious web site. No further information is currently available. 3) Some vulnerabilities are caused due to vulnerabilities in the bundled version of Adobe BlazeDS

Trust: 2.07

sources: NVD: CVE-2011-2093 // JVNDB: JVNDB-2011-001778 // BID: 48267 // PACKETSTORM: 102306 // PACKETSTORM: 102313

AFFECTED PRODUCTS

vendor:adobemodel:livecyclescope:eqversion:8.0.1.2

Trust: 1.6

vendor:adobemodel:livecyclescope:eqversion:7.0

Trust: 1.6

vendor:adobemodel:livecyclescope:eqversion:8.0.1.1

Trust: 1.6

vendor:adobemodel:livecyclescope:eqversion:8.0.1

Trust: 1.6

vendor:adobemodel:livecyclescope:eqversion:6.0

Trust: 1.6

vendor:adobemodel:livecycle data servicesscope:eqversion:2.6

Trust: 1.6

vendor:adobemodel:livecyclescope:eqversion:8.2.1.3

Trust: 1.6

vendor:adobemodel:livecycle data servicesscope:eqversion:2.5

Trust: 1.6

vendor:adobemodel:livecycle data servicesscope:eqversion:2.6.1

Trust: 1.6

vendor:adobemodel:blazedsscope:lteversion:4.0.1

Trust: 1.0

vendor:adobemodel:livecycle data servicesscope:eqversion:3

Trust: 1.0

vendor:adobemodel:livecycle data servicesscope:eqversion:2.5.1

Trust: 1.0

vendor:adobemodel:livecycle data servicesscope:lteversion:3.1

Trust: 1.0

vendor:adobemodel:livecyclescope:lteversion:9.0.0.2

Trust: 1.0

vendor:adobemodel:livecycle data servicesscope:lteversion:3.1 and earlier for windows

Trust: 0.8

vendor:adobemodel:livecyclescope:lteversion:9.0.0.2 and earlier for windows

Trust: 0.8

vendor:adobemodel:livecycle data servicesscope:lteversion:2.6.1 and earlier for windows

Trust: 0.8

vendor:hitachimodel:jp1/it desktop managementscope:eqversion:- manager

Trust: 0.8

vendor:adobemodel:blazedsscope:lteversion:4.0.1 and earlier

Trust: 0.8

vendor:adobemodel:livecyclescope:eqversion:linux unix

Trust: 0.8

vendor:hitachimodel:it operations directorscope: - version: -

Trust: 0.8

vendor:adobemodel:livecycle data servicesscope:eqversion:macintosh unix

Trust: 0.8

vendor:hitachimodel:device managerscope:eqversion:software

Trust: 0.8

vendor:adobemodel:livecycle data servicesscope:lteversion:2.5.1 and earlier for windows

Trust: 0.8

vendor:adobemodel:livecyclescope:lteversion:8.2.1.3 and earlier for windows

Trust: 0.8

vendor:adobemodel:livecyclescope:lteversion:8.0.1.3 and earlier for windows

Trust: 0.8

vendor:hitachimodel:tiered storage managerscope:eqversion:software

Trust: 0.8

vendor:adobemodel:livecyclescope:eqversion:9.0.0.2

Trust: 0.6

vendor:hpmodel:systems insight managerscope:eqversion:6.3

Trust: 0.3

vendor:hpmodel:systems insight managerscope:eqversion:6.2

Trust: 0.3

vendor:hpmodel:systems insight managerscope:eqversion:6.1

Trust: 0.3

vendor:hpmodel:systems insight managerscope:eqversion:6.0.0.96

Trust: 0.3

vendor:hpmodel:systems insight managerscope:eqversion:6.0

Trust: 0.3

vendor:hpmodel:systems insight manager updatescope:eqversion:5.31

Trust: 0.3

vendor:hpmodel:systems insight managerscope:eqversion:5.3

Trust: 0.3

vendor:hpmodel:systems insight manager sp2scope:eqversion:5.2

Trust: 0.3

vendor:hpmodel:systems insight manager sp1scope:eqversion:5.1

Trust: 0.3

vendor:hpmodel:systems insight manager sp6scope:eqversion:5.0

Trust: 0.3

vendor:hpmodel:systems insight manager sp5scope:eqversion:5.0

Trust: 0.3

vendor:hpmodel:systems insight manager sp3scope:eqversion:5.0

Trust: 0.3

vendor:hpmodel:systems insight manager sp2scope:eqversion:5.0

Trust: 0.3

vendor:hpmodel:systems insight manager sp1scope:eqversion:5.0

Trust: 0.3

vendor:hpmodel:systems insight managerscope:eqversion:5.0

Trust: 0.3

vendor:hpmodel:systems insight manager sp2scope:eqversion:4.2

Trust: 0.3

vendor:hpmodel:systems insight manager sp1scope:eqversion:4.2

Trust: 0.3

vendor:hpmodel:systems insight managerscope:eqversion:4.2

Trust: 0.3

vendor:adobemodel:lifecycle data servicesscope:eqversion:2.6.1

Trust: 0.3

vendor:adobemodel:lifecycle data servicesscope:eqversion:3.1

Trust: 0.3

vendor:adobemodel:lifecycle data servicesscope:eqversion:2.5.1

Trust: 0.3

vendor:adobemodel:lifecyclescope:eqversion:9.0.0.2

Trust: 0.3

vendor:adobemodel:lifecyclescope:eqversion:8.2.1.3

Trust: 0.3

vendor:adobemodel:lifecyclescope:eqversion:8.0.1.3

Trust: 0.3

vendor:adobemodel:blazedsscope:eqversion:4.0.1

Trust: 0.3

vendor:adobemodel:blazedsscope:eqversion:4.0

Trust: 0.3

vendor:hpmodel:systems insight managerscope:neversion:7.0

Trust: 0.3

sources: BID: 48267 // JVNDB: JVNDB-2011-001778 // CNNVD: CNNVD-201106-174 // NVD: CVE-2011-2093

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2011-2093
value: MEDIUM

Trust: 1.0

NVD: CVE-2011-2093
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201106-174
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2011-2093
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

sources: JVNDB: JVNDB-2011-001778 // CNNVD: CNNVD-201106-174 // NVD: CVE-2011-2093

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.8

sources: JVNDB: JVNDB-2011-001778 // NVD: CVE-2011-2093

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201106-174

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-201106-174

CONFIGURATIONS

sources: JVNDB: JVNDB-2011-001778

PATCH

title:APSB11-15url:http://www.adobe.com/support/security/bulletins/apsb11-15.html

Trust: 0.8

title:APSB11-15url:http://www.adobe.com/jp/support/security/bulletins/apsb11-15.html

Trust: 0.8

title:HS12-018url:http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-018/index.html

Trust: 0.8

title:HS12-011url:http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-011/index.html

Trust: 0.8

title:HS12-014url:http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-014/index.html

Trust: 0.8

title:HPSBMU02769 SSRT100846url:http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03298151

Trust: 0.8

title:HS12-018url:http://www.hitachi.co.jp/Prod/comp/soft1/security/info/vuls/HS12-018/index.html

Trust: 0.8

title:HS12-011url:http://www.hitachi.co.jp/Prod/comp/soft1/security/info/vuls/HS12-011/index.html

Trust: 0.8

title:HS12-014url:http://www.hitachi.co.jp/Prod/comp/soft1/security/info/vuls/HS12-014/index.html

Trust: 0.8

sources: JVNDB: JVNDB-2011-001778

EXTERNAL IDS

db:NVDid:CVE-2011-2093

Trust: 2.7

db:BIDid:48267

Trust: 1.3

db:SECTRACKid:1025657

Trust: 1.0

db:SECTRACKid:1025656

Trust: 1.0

db:OSVDBid:73009

Trust: 1.0

db:JVNDBid:JVNDB-2011-001778

Trust: 0.8

db:SECUNIAid:44922

Trust: 0.7

db:SECUNIAid:43013

Trust: 0.7

db:NSFOCUSid:17048

Trust: 0.6

db:NSFOCUSid:17130

Trust: 0.6

db:CNNVDid:CNNVD-201106-174

Trust: 0.6

db:PACKETSTORMid:102306

Trust: 0.1

db:PACKETSTORMid:102313

Trust: 0.1

sources: BID: 48267 // JVNDB: JVNDB-2011-001778 // PACKETSTORM: 102306 // PACKETSTORM: 102313 // CNNVD: CNNVD-201106-174 // NVD: CVE-2011-2093

REFERENCES

url:http://www.adobe.com/support/security/bulletins/apsb11-15.html

Trust: 2.0

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/68026

Trust: 1.0

url:http://osvdb.org/73009

Trust: 1.0

url:http://www.securityfocus.com/bid/48267

Trust: 1.0

url:http://www.securitytracker.com/id?1025657

Trust: 1.0

url:http://www.securitytracker.com/id?1025656

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-2093

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-2093

Trust: 0.8

url:http://secunia.com/advisories/43013

Trust: 0.6

url:http://secunia.com/advisories/44922

Trust: 0.6

url:http://www.nsfocus.net/vulndb/17130

Trust: 0.6

url:http://www.nsfocus.net/vulndb/17048

Trust: 0.6

url:http://www.adobe.com

Trust: 0.3

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.2

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.2

url:http://conference.first.org/

Trust: 0.2

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.2

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.2

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.2

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.2

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=44922

Trust: 0.1

url:http://wouter.coekaerts.be/2011/amf-arbitrary-code-execution

Trust: 0.1

url:http://secunia.com/advisories/44922/

Trust: 0.1

url:http://secunia.com/advisories/44922/#comments

Trust: 0.1

url:http://www.adobe.com/support/security/bulletins/apsb11-14.html

Trust: 0.1

url:http://secunia.com/advisories/43013/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=43013

Trust: 0.1

url:http://secunia.com/advisories/43013/#comments

Trust: 0.1

sources: BID: 48267 // JVNDB: JVNDB-2011-001778 // PACKETSTORM: 102306 // PACKETSTORM: 102313 // CNNVD: CNNVD-201106-174 // NVD: CVE-2011-2093

CREDITS

Wouter Coekaerts

Trust: 0.3

sources: BID: 48267

SOURCES

db:BIDid:48267
db:JVNDBid:JVNDB-2011-001778
db:PACKETSTORMid:102306
db:PACKETSTORMid:102313
db:CNNVDid:CNNVD-201106-174
db:NVDid:CVE-2011-2093

LAST UPDATE DATE

2024-11-23T22:23:27.492000+00:00


SOURCES UPDATE DATE

db:BIDid:48267date:2012-05-01T17:21:00
db:JVNDBid:JVNDB-2011-001778date:2013-03-26T00:00:00
db:CNNVDid:CNNVD-201106-174date:2011-06-17T00:00:00
db:NVDid:CVE-2011-2093date:2024-11-21T01:27:34.427

SOURCES RELEASE DATE

db:BIDid:48267date:2011-06-14T00:00:00
db:JVNDBid:JVNDB-2011-001778date:2011-06-28T00:00:00
db:PACKETSTORMid:102306date:2011-06-16T02:14:36
db:PACKETSTORMid:102313date:2011-06-16T02:14:54
db:CNNVDid:CNNVD-201106-174date:2011-06-17T00:00:00
db:NVDid:CVE-2011-2093date:2011-06-16T23:55:01.557