CVE-2010-2883
KEV
🔴 Łataj teraz
Przepełnienie bufora w CoolType.dll w Adobe Reader umożliwia zdalne wykonanie kodu.
CVSS
7.3
EPSS
93.2%
Exploit
weaponized
Vendor
adobe
Opis źródłowy (NVD)
Stack-based buffer overflow in CoolType.dll in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a PDF document with a long field in a Smart INdependent Glyphlets (SING) table in a TTF font, as exploited in the wild in September 2010. NOTE: some of these details are obtained from third party information.
buffer-overflow dos
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 7.3 |
| CISA KEV (aktywnie wykorzystywane) | Tak |
| FIRST EPSS (prawdopodobieństwo exploita) | 93.2% |
| Opublikowano (NVD) | 2010-09-09 22:00:02 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-21 20:31:14 UTC |
Referencje
- http://blog.metasploit.com/2010/09/return-of-unpublished-adobe.html (psirt@adobe.com) [Broken Link]
- http://community.websense.com/blogs/securitylabs/archive/2010/09/10/brief-analysis-on-adobe-reader-sing-table-parsing-vulnerability-cve-2010-2883.aspx (psirt@adobe.com) [Broken Link]
- http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00001.html (psirt@adobe.com) [Broken Link]
- http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html (psirt@adobe.com) [Broken Link]
- http://secunia.com/advisories/41340 (psirt@adobe.com) [Broken Link, Vendor Advisory]
- http://secunia.com/advisories/43025 (psirt@adobe.com) [Broken Link, Vendor Advisory]
- http://security.gentoo.org/glsa/glsa-201101-08.xml (psirt@adobe.com) [Third Party Advisory]
- http://www.adobe.com/support/security/advisories/apsa10-02.html (psirt@adobe.com) [Vendor Advisory]
- http://www.adobe.com/support/security/bulletins/apsb10-21.html (psirt@adobe.com) [Vendor Advisory]
- http://www.kb.cert.org/vuls/id/491991 (psirt@adobe.com) [Third Party Advisory, US Government Resource]
- http://www.redhat.com/support/errata/RHSA-2010-0743.html (psirt@adobe.com) [Broken Link]
- http://www.securityfocus.com/bid/43057 (psirt@adobe.com) [Broken Link, Third Party Advisory, VDB Entry]
- http://www.turbolinux.co.jp/security/2011/TLSA-2011-2j.txt (psirt@adobe.com) [Broken Link]
- http://www.us-cert.gov/cas/techalerts/TA10-279A.html (psirt@adobe.com) [Third Party Advisory, US Government Resource]
- http://www.vupen.com/english/advisories/2010/2331 (psirt@adobe.com) [Broken Link, Vendor Advisory]
- http://www.vupen.com/english/advisories/2011/0191 (psirt@adobe.com) [Broken Link, Vendor Advisory]
- http://www.vupen.com/english/advisories/2011/0344 (psirt@adobe.com) [Broken Link, Vendor Advisory]
- https://exchange.xforce.ibmcloud.com/vulnerabilities/61635 (psirt@adobe.com) [Third Party Advisory, VDB Entry]
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11586 (psirt@adobe.com) [Broken Link]
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2010-2883 (134c704f-9b21-4f2e-91b3-4a467353bcc0) [US Government Resource]