9.3

CVE-2010-2883

Warnung

Stack-based buffer overflow in CoolType.dll in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a PDF document with a long field in a Smart INdependent Glyphlets (SING) table in a TTF font, as exploited in the wild in September 2010. NOTE: some of these details are obtained from third party information.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
AdobeAcrobat Version >= 8.0 < 8.2.5
   ApplemacOS Version-
   MicrosoftWindows Version-
AdobeAcrobat Version >= 9.0 < 9.4
   ApplemacOS Version-
   MicrosoftWindows Version-
AdobeAcrobat Reader Version >= 8.0 < 8.2.5
   ApplemacOS Version-
   MicrosoftWindows Version-
AdobeAcrobat Reader Version >= 9.0 < 9.4
   ApplemacOS Version-
   MicrosoftWindows Version-

08.06.2022: CISA Known Exploited Vulnerabilities (KEV) Catalog

Adobe Acrobat and Reader Stack-Based Buffer Overflow Vulnerability

Schwachstelle

Adobe Acrobat and Reader contain a stack-based buffer overflow vulnerability that allows remote attackers to execute code or cause denial-of-service (DoS).

Beschreibung

Apply updates per vendor instructions.

Erforderliche Maßnahmen
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 93% 0.998
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 7.3 1.3 5.9
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
nvd@nist.gov 9.3 8.6 10
AV:N/AC:M/Au:N/C:C/I:C/A:C
134c704f-9b21-4f2e-91b3-4a467353bcc0 7.3 1.3 5.9
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
CWE-787 Out-of-bounds Write

The product writes data past the end, or before the beginning, of the intended buffer.

http://secunia.com/advisories/41340
Vendor Advisory
Broken Link
http://secunia.com/advisories/43025
Vendor Advisory
Broken Link
http://www.kb.cert.org/vuls/id/491991
Third Party Advisory
US Government Resource
http://www.securityfocus.com/bid/43057
Third Party Advisory
Broken Link
VDB Entry
http://www.us-cert.gov/cas/techalerts/TA10-279A.html
Third Party Advisory
US Government Resource