CVE-2010-1241
Published Apr 5, 2010
Last updated 7 years ago
Overview
- Description
- Heap-based buffer overflow in the custom heap management system in Adobe Reader and Acrobat 9.x before 9.3.2, and 8.x before 8.2.2 on Windows and Mac OS X, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted PDF document, aka FG-VD-10-005.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 9.3
- Impact score
- 10
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-119
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "996EB48E-D2A8-49E4-915A-EBDE26A9FB94" }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "97E20936-EE31-4CEB-A710-3165A28BAD69" }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5BD9952C-A1D0-4DFB-A292-9B86D7EAE5FD" }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C5BEA847-A71E-4336-AB67-B3C38847C1C3" }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "39F6994B-6969-485B-9286-2592B11A47BF" }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FC533775-B52E-43F0-BF19-1473BE36232D" }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.1.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "18D1C85E-42CC-46F2-A7B6-DAC3C3995330" }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.1.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C4670451-511E-496C-A78A-887366E1E992" }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1A2A4F62-7AB5-4134-9A65-4B4E1EA262A3" }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:8.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "35994F76-CD13-4301-9134-FC0CBEA37D97" }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "562772F1-1627-438E-A6B8-7D1AA5536086" }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "27D5AF92-A8E1-41BD-B20A-EB26BB6AD4DE" }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F25C9167-C6D4-4264-9197-50878EDA2D96" }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DD1D7308-09E9-42B2-8836-DC2326C62A9E" }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B5C251D2-4C9B-4029-8BED-0FCAED3B8E89" }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2432AC17-5378-4C61-A775-5172FD44EC03" }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B6BA82F4-470D-4A46-89B2-D2F3C8FA31C8" }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:9.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "39EDED39-664F-4B68-B422-2CCCA3B83550" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574" }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256" } ], "operator": "OR" } ], "operator": "AND" } ]