Vulnerability Details : CVE-2010-2883
Public exploit exists!
Stack-based buffer overflow in CoolType.dll in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a PDF document with a long field in a Smart INdependent Glyphlets (SING) table in a TTF font, as exploited in the wild in September 2010. NOTE: some of these details are obtained from third party information.
Vulnerability category: OverflowExecute codeDenial of service
CVE-2010-2883 is in the CISA Known Exploited Vulnerabilities Catalog
CISA vulnerability name:
Adobe Acrobat and Reader Stack-Based Buffer Overflow Vulnerability
CISA required action:
Apply updates per vendor instructions.
CISA description:
Adobe Acrobat and Reader contain a stack-based buffer overflow vulnerability that allows remote attackers to execute code or cause denial-of-service (DoS).
Added on
2022-06-08
Action due date
2022-06-22
Exploit prediction scoring system (EPSS) score for CVE-2010-2883
Probability of exploitation activity in the next 30 days: 80.94%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 98 % EPSS Score History EPSS FAQ
Metasploit modules for CVE-2010-2883
-
Adobe CoolType SING Table "uniqueName" Stack Buffer Overflow
Disclosure Date: 2010-09-07First seen: 2020-04-26exploit/windows/browser/adobe_cooltype_singThis module exploits a vulnerability in the Smart INdependent Glyplets (SING) table handling within versions 8.2.4 and 9.3.4 of Adobe Reader. Prior versions are assumed to be vulnerable as well. Authors: - Unknown - sn0wfl0w - jduck <jduck@metasploit.com> -
Adobe CoolType SING Table "uniqueName" Stack Buffer Overflow
Disclosure Date: 2010-09-07First seen: 2020-04-26exploit/windows/fileformat/adobe_cooltype_singThis module exploits a vulnerability in the Smart INdependent Glyplets (SING) table handling within versions 8.2.4 and 9.3.4 of Adobe Reader. Prior versions are assumed to be vulnerable as well. Authors: - Unknown - sn0wfl0w - jduck <jduck@metasploit.com>
CVSS scores for CVE-2010-2883
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST |
CWE ids for CVE-2010-2883
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2010-2883
-
http://www.redhat.com/support/errata/RHSA-2010-0743.html
Support
-
http://www.kb.cert.org/vuls/id/491991
VU#491991 - Adobe Reader and Acrobat Font Parsing Buffer Overflow VulnerabilityUS Government Resource
-
http://www.adobe.com/support/security/bulletins/apsb10-21.html
Adobe - Security Bulletins: Security Bulletin APSB10-21 - Security Updates Available for Adobe Reader and Acrobat
-
http://community.websense.com/blogs/securitylabs/archive/2010/09/10/brief-analysis-on-adobe-reader-sing-table-parsing-vulnerability-cve-2010-2883.aspx
Home | Forcepoint Support
-
http://www.vupen.com/english/advisories/2010/2331
Webmail | OVH- OVHVendor Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html
[security-announce] SUSE Security Summary Report: SUSE-SR:2010:019
-
http://www.vupen.com/english/advisories/2011/0344
Webmail | OVH- OVHVendor Advisory
-
http://www.adobe.com/support/security/advisories/apsa10-02.html
Adobe - Security Advisories: APSA10-02 - Security Advisory for Adobe Reader and AcrobatVendor Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/61635
Adobe Reader cooltype.dll code execution CVE-2010-2883 Vulnerability Report
-
http://blog.metasploit.com/2010/09/return-of-unpublished-adobe.html
Help @ Rapid7
-
http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00001.html
[security-announce] SUSE Security Announcement: acroread (SUSE-SA:2010:0
-
http://www.us-cert.gov/cas/techalerts/TA10-279A.html
Adobe Reader and Acrobat Affected by Multiple Vulnerabilities | CISAUS Government Resource
-
http://www.vupen.com/english/advisories/2011/0191
Webmail | OVH- OVHVendor Advisory
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11586
Repository / Oval Repository
-
http://www.securityfocus.com/bid/43057
Adobe Reader 'CoolType.dll' TTF Font Remote Code Execution Vulnerability
-
http://security.gentoo.org/glsa/glsa-201101-08.xml
Adobe Reader: Multiple vulnerabilities (GLSA 201101-08) — Gentoo security
- http://www.turbolinux.co.jp/security/2011/TLSA-2011-2j.txt
Products affected by CVE-2010-2883
- cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:8.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:8.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:8.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:8.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:8.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:8.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:8.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:8.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:8.1.6:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:8.1.7:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:8.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:8.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:9.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:9.3:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:9.2:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:9.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:9.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:9.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:8.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:8.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:8.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:8.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:8.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:8.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:8.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:8.2:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:8.1.6:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:8.1.7:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:8.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:8.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:8.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.2:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.3:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.3.3:*:*:*:*:*:*:*