Stack-based buffer overflow in CoolType.dll in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a PDF document with a long field in a Smart INdependent Glyphlets (SING) table in a TTF font, as exploited in the wild in September 2010. NOTE: some of these details are obtained from third party information.
References
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
History
19 Dec 2024, 18:19
Type | Values Removed | Values Added |
---|---|---|
References | () http://security.gentoo.org/glsa/glsa-201101-08.xml - Third Party Advisory | |
References | () http://www.kb.cert.org/vuls/id/491991 - Third Party Advisory, US Government Resource | |
References | () http://www.vupen.com/english/advisories/2010/2331 - Broken Link, Vendor Advisory | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11586 - Broken Link | |
References | () http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html - Broken Link | |
References | () http://www.vupen.com/english/advisories/2011/0344 - Broken Link, Vendor Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00001.html - Broken Link | |
References | () http://secunia.com/advisories/43025 - Broken Link, Vendor Advisory | |
References | () http://www.us-cert.gov/cas/techalerts/TA10-279A.html - Third Party Advisory, US Government Resource | |
References | () http://blog.metasploit.com/2010/09/return-of-unpublished-adobe.html - Broken Link | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/61635 - Third Party Advisory, VDB Entry | |
References | () http://www.vupen.com/english/advisories/2011/0191 - Broken Link, Vendor Advisory | |
References | () http://www.adobe.com/support/security/advisories/apsa10-02.html - Vendor Advisory | |
References | () http://secunia.com/advisories/41340 - Broken Link, Vendor Advisory | |
References | () http://www.redhat.com/support/errata/RHSA-2010-0743.html - Broken Link | |
References | () http://www.turbolinux.co.jp/security/2011/TLSA-2011-2j.txt - Broken Link | |
References | () http://www.securityfocus.com/bid/43057 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://community.websense.com/blogs/securitylabs/archive/2010/09/10/brief-analysis-on-adobe-reader-sing-table-parsing-vulnerability-cve-2010-2883.aspx - Broken Link | |
References | () http://www.adobe.com/support/security/bulletins/apsb10-21.html - Vendor Advisory |
28 Jun 2024, 14:16
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-787 | |
First Time |
Apple macos
|
|
CVSS |
v2 : v3 : |
v2 : 9.3
v3 : 7.3 |
CPE | cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.3.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:8.2.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:8.1.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.3.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:8.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:8.2.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.1.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.3.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:8.1.6:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:8.1.7:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:8.1.5:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:8.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.3.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:8.1.7:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:8.1.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:8.1.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.3.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:8.2.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:8.1.4:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:8.1.4:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:8.1.5:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:8.1.6:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:8.2.4:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:8.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:8.2.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:8.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.2:*:*:*:*:*:*:* cpe:2.3:a:apple:mac_os_x:*:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:8.1.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:8.1.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:8.2.4:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.3.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:8.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.1.3:*:*:*:*:*:*:* |
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:* |
References | (SECUNIA) http://secunia.com/advisories/43025 - Broken Link, Vendor Advisory | |
References | (CERT-VN) http://www.kb.cert.org/vuls/id/491991 - Third Party Advisory, US Government Resource | |
References | (CONFIRM) http://www.adobe.com/support/security/bulletins/apsb10-21.html - Vendor Advisory | |
References | (CERT) http://www.us-cert.gov/cas/techalerts/TA10-279A.html - Third Party Advisory, US Government Resource | |
References | (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/61635 - Third Party Advisory, VDB Entry | |
References | (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11586 - Broken Link | |
References | (MISC) http://community.websense.com/blogs/securitylabs/archive/2010/09/10/brief-analysis-on-adobe-reader-sing-table-parsing-vulnerability-cve-2010-2883.aspx - Broken Link | |
References | (SUSE) http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html - Broken Link | |
References | (TURBO) http://www.turbolinux.co.jp/security/2011/TLSA-2011-2j.txt - Broken Link | |
References | (VUPEN) http://www.vupen.com/english/advisories/2010/2331 - Broken Link, Vendor Advisory | |
References | (REDHAT) http://www.redhat.com/support/errata/RHSA-2010-0743.html - Broken Link | |
References | (SUSE) http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00001.html - Broken Link | |
References | (BID) http://www.securityfocus.com/bid/43057 - Broken Link, Third Party Advisory, VDB Entry | |
References | (VUPEN) http://www.vupen.com/english/advisories/2011/0344 - Broken Link, Vendor Advisory | |
References | (GENTOO) http://security.gentoo.org/glsa/glsa-201101-08.xml - Third Party Advisory | |
References | (VUPEN) http://www.vupen.com/english/advisories/2011/0191 - Broken Link, Vendor Advisory | |
References | (MISC) http://blog.metasploit.com/2010/09/return-of-unpublished-adobe.html - Broken Link | |
References | (SECUNIA) http://secunia.com/advisories/41340 - Broken Link, Vendor Advisory |
Information
Published : 2010-09-09 22:00
Updated : 2025-02-13 17:51
NVD link : CVE-2010-2883
Mitre link : CVE-2010-2883
JSON object : View
Products Affected
adobe
- acrobat
- acrobat_reader
microsoft
- windows
apple
- macos
CWE
CWE-787
Out-of-bounds Write