CVE-2010-1297
KEV
🔴 Łataj teraz
W Adobe Flash Player, AIR i Readerze występuje podatność umożliwiająca zdalne wykonanie kodu.
CVSS
7.8
EPSS
92.8%
Exploit
weaponized
Vendor
adobe
Opis źródłowy (NVD)
Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64; Adobe AIR before 2.0.2.12610; and Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted SWF content, related to authplay.dll and the ActionScript Virtual Machine 2 (AVM2) newfunction instruction, as exploited in the wild in June 2010.
dos exploit
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 7.8 |
| CISA KEV (aktywnie wykorzystywane) | Tak |
| FIRST EPSS (prawdopodobieństwo exploita) | 92.8% |
| Opublikowano (NVD) | 2010-06-08 18:30:10 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-21 21:12:57 UTC |
Referencje
- http://blog.zynamics.com/2010/06/09/analyzing-the-currently-exploited-0-day-for-adobe-reader-and-adobe-flash/ (psirt@adobe.com) [Exploit]
- http://community.websense.com/blogs/securitylabs/archive/2010/06/09/having-fun-with-adobe-0-day-exploits.aspx (psirt@adobe.com) [Broken Link]
- http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751 (psirt@adobe.com) [Broken Link]
- http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html (psirt@adobe.com) [Mailing List, Third Party Advisory]
- http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00000.html (psirt@adobe.com) [Mailing List, Third Party Advisory]
- http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html (psirt@adobe.com) [Mailing List, Third Party Advisory]
- http://secunia.com/advisories/40026 (psirt@adobe.com) [Broken Link, Vendor Advisory]
- http://secunia.com/advisories/40034 (psirt@adobe.com) [Broken Link, Vendor Advisory]
- http://secunia.com/advisories/40144 (psirt@adobe.com) [Broken Link]
- http://secunia.com/advisories/40545 (psirt@adobe.com) [Broken Link]
- http://secunia.com/advisories/43026 (psirt@adobe.com) [Broken Link]
- http://security.gentoo.org/glsa/glsa-201101-09.xml (psirt@adobe.com) [Third Party Advisory]
- http://securitytracker.com/id?1024057 (psirt@adobe.com) [Broken Link, Third Party Advisory, VDB Entry]
- http://securitytracker.com/id?1024058 (psirt@adobe.com) [Broken Link, Third Party Advisory, VDB Entry]
- http://securitytracker.com/id?1024085 (psirt@adobe.com) [Broken Link, Third Party Advisory, VDB Entry]
- http://securitytracker.com/id?1024086 (psirt@adobe.com) [Broken Link, Third Party Advisory, VDB Entry]
- http://support.apple.com/kb/HT4435 (psirt@adobe.com) [Broken Link]
- http://www.adobe.com/support/security/advisories/apsa10-01.html (psirt@adobe.com) [Vendor Advisory]
- http://www.adobe.com/support/security/bulletins/apsb10-14.html (psirt@adobe.com) [Not Applicable]
- http://www.adobe.com/support/security/bulletins/apsb10-15.html (psirt@adobe.com) [Not Applicable]
- http://www.exploit-db.com/exploits/13787 (psirt@adobe.com) [Third Party Advisory, VDB Entry]
- http://www.kb.cert.org/vuls/id/486225 (psirt@adobe.com) [Third Party Advisory, US Government Resource]
- http://www.osvdb.org/65141 (psirt@adobe.com) [Broken Link]
- http://www.redhat.com/support/errata/RHSA-2010-0464.html (psirt@adobe.com) [Broken Link]
- http://www.redhat.com/support/errata/RHSA-2010-0470.html (psirt@adobe.com) [Broken Link]
- http://www.securityfocus.com/bid/40586 (psirt@adobe.com) [Broken Link, Third Party Advisory, VDB Entry]
- http://www.securityfocus.com/bid/40759 (psirt@adobe.com) [Broken Link, Third Party Advisory, VDB Entry]
- http://www.turbolinux.co.jp/security/2010/TLSA-2010-19j.txt (psirt@adobe.com) [Broken Link]
- http://www.us-cert.gov/cas/techalerts/TA10-159A.html (psirt@adobe.com) [Third Party Advisory, US Government Resource]
- http://www.us-cert.gov/cas/techalerts/TA10-162A.html (psirt@adobe.com) [Third Party Advisory, US Government Resource]
- http://www.vupen.com/english/advisories/2010/1348 (psirt@adobe.com) [Broken Link, Vendor Advisory]
- http://www.vupen.com/english/advisories/2010/1349 (psirt@adobe.com) [Broken Link, Vendor Advisory]
- http://www.vupen.com/english/advisories/2010/1421 (psirt@adobe.com) [Broken Link]
- http://www.vupen.com/english/advisories/2010/1432 (psirt@adobe.com) [Broken Link]
- http://www.vupen.com/english/advisories/2010/1434 (psirt@adobe.com) [Broken Link]
- http://www.vupen.com/english/advisories/2010/1453 (psirt@adobe.com) [Broken Link]
- http://www.vupen.com/english/advisories/2010/1482 (psirt@adobe.com) [Broken Link]
- http://www.vupen.com/english/advisories/2010/1522 (psirt@adobe.com) [Broken Link]
- http://www.vupen.com/english/advisories/2010/1636 (psirt@adobe.com) [Broken Link]
- http://www.vupen.com/english/advisories/2010/1793 (psirt@adobe.com) [Broken Link]
- http://www.vupen.com/english/advisories/2011/0192 (psirt@adobe.com) [Broken Link]
- https://exchange.xforce.ibmcloud.com/vulnerabilities/59137 (psirt@adobe.com) [Third Party Advisory, VDB Entry]
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7116 (psirt@adobe.com) [Broken Link]
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2010-1297 (134c704f-9b21-4f2e-91b3-4a467353bcc0) [US Government Resource]