mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
267 lines
9.2 KiB
JSON
267 lines
9.2 KiB
JSON
{
|
|
"id": "CVE-2010-1278",
|
|
"sourceIdentifier": "psirt@adobe.com",
|
|
"published": "2010-04-22T14:30:00.980",
|
|
"lastModified": "2025-04-11T00:51:21.963",
|
|
"vulnStatus": "Deferred",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Buffer overflow in the Atlcom.get_atlcom ActiveX control in gp.ocx in Adobe Download Manager, as used in Adobe Reader and Acrobat 8.x before 8.2 and 9.x before 9.3, allows remote attackers to execute arbitrary code via unspecified parameters."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Desbordamiento de b\u00fafer en el control ActiveX Atlcom.get_atlcom de gp.ocx de Adobe Download Manager, como el que se utiliza en Adobe Reader y Acrobat v8.x anterior a 8.2 y v9.x anterior a 9.3, permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n mediante par\u00e1metros no especificados."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"baseScore": 9.3,
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "COMPLETE",
|
|
"integrityImpact": "COMPLETE",
|
|
"availabilityImpact": "COMPLETE"
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 8.6,
|
|
"impactScore": 10.0,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": true
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-119"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adobe:reader:8.0.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B749478C-54F5-43EA-A97E-9444E5A06130"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adobe:reader:8.1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "98BCBFB5-72DF-4B8A-8F4C-E958B4FAFB37"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adobe:reader:8.1.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "71EB6E18-5764-4916-9ECA-F4E880672217"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adobe:reader:8.1.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "61151189-E24C-4AB6-BC60-B9AF720E3D4B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adobe:reader:8.1.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "97EFCA72-99DC-4CF0-9E01-D635F0E70D48"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adobe:reader:8.1.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1B65F7E5-05A4-45FC-BDC2-670166535721"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adobe:reader:8.1.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "274E5B77-769B-4B84-8C84-5C9D3C46F638"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adobe:reader:9.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "026B1CF8-28A2-415D-A240-C9DF774BF9DD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adobe:reader:9.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FBE16943-CCD8-4A39-832F-F6ED3CF2936B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adobe:reader:9.1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9F9C8041-A6AC-4B4B-840E-8FC62AD5974D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adobe:reader:9.1.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "42A1A800-D0CC-4593-A31A-EE308E63B454"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adobe:reader:9.1.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "51D39658-8C3F-4B05-AEDF-228C4047F8AC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adobe:reader:9.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "68371B9C-FC9D-41C8-BFF6-3F579A46ABC4"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adobe:acrobat:8.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "26AE76F7-D7F6-4AF2-A5C6-708B5642C288"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adobe:acrobat:8.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "749FFB51-65D4-4A4B-95F3-742440276897"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adobe:acrobat:8.1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C8665E53-EC1E-4B95-9064-2565BC12113E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adobe:acrobat:8.1.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "24218FDA-F9DA-465A-B5D5-76A55C7EE04E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adobe:acrobat:8.1.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E2C5F1C5-85CD-47B9-897F-E51D6902AF72"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adobe:acrobat:8.1.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E0E190FF-3EBC-44AB-8072-4D964E843E8A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adobe:acrobat:8.1.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6A624D44-C135-4ED3-9BA4-F4F8A044850B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adobe:acrobat:8.1.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B95C0A99-42E4-40A9-BF61-507E4E4DC052"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adobe:acrobat:8.1.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3B9F55CC-3681-4A67-99D1-3F40447392D5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5AA53564-9ACD-4CFB-9AAC-A77440026A57"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C7EC46E3-77B7-4455-B3E0-A45C6B69B3DC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4F475858-DCE2-4C93-A51A-04718DF17593"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "88687272-4CD0-42A2-B727-C322ABDE3549"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adobe:acrobat:9.1.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1E5C4FA4-3786-47AF-BD7D-8E75927EB3AA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:adobe:acrobat:9.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B35CC915-EEE3-4E86-9E09-1893C725E07B"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://www.adobe.com/support/security/bulletins/apsb10-02.html",
|
|
"source": "psirt@adobe.com",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/archive/1/510868/100/0/threaded",
|
|
"source": "psirt@adobe.com"
|
|
},
|
|
{
|
|
"url": "http://www.securitytracker.com/id?1023908",
|
|
"source": "psirt@adobe.com"
|
|
},
|
|
{
|
|
"url": "http://www.zerodayinitiative.com/advisories/ZDI-10-077/",
|
|
"source": "psirt@adobe.com"
|
|
},
|
|
{
|
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7500",
|
|
"source": "psirt@adobe.com"
|
|
},
|
|
{
|
|
"url": "http://www.adobe.com/support/security/bulletins/apsb10-02.html",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/archive/1/510868/100/0/threaded",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://www.securitytracker.com/id?1023908",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://www.zerodayinitiative.com/advisories/ZDI-10-077/",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7500",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
}
|
|
]
|
|
} |