Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2011-2098 (GCVE-0-2011-2098)
Vulnerability from cvelistv5 – Published: 2011-06-16 23:00 – Updated: 2024-08-06 22:53- n/a
| URL | Tags | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T22:53:15.883Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "48245",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/48245"
},
{
"name": "adobe-reader-ce(68012)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68012"
},
{
"name": "73059",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/73059"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.adobe.com/support/security/bulletins/apsb11-16.html"
},
{
"name": "TA11-166A",
"tags": [
"third-party-advisory",
"x_refsource_CERT",
"x_transferred"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html"
},
{
"name": "1025658",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1025658"
},
{
"name": "oval:org.mitre.oval:def:14192",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14192"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-06-14T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Adobe Reader and Acrobat 8.x before 8.3, 9.x before 9.4.5, and 10.x before 10.1 on Windows and Mac OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2099."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-09-18T12:57:01.000Z",
"orgId": "078d4453-3bcd-4900-85e6-15281da43538",
"shortName": "adobe"
},
"references": [
{
"name": "48245",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/48245"
},
{
"name": "adobe-reader-ce(68012)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68012"
},
{
"name": "73059",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/73059"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.adobe.com/support/security/bulletins/apsb11-16.html"
},
{
"name": "TA11-166A",
"tags": [
"third-party-advisory",
"x_refsource_CERT"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html"
},
{
"name": "1025658",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1025658"
},
{
"name": "oval:org.mitre.oval:def:14192",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14192"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2011-2098",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Adobe Reader and Acrobat 8.x before 8.3, 9.x before 9.4.5, and 10.x before 10.1 on Windows and Mac OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2099."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "48245",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/48245"
},
{
"name": "adobe-reader-ce(68012)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68012"
},
{
"name": "73059",
"refsource": "OSVDB",
"url": "http://osvdb.org/73059"
},
{
"name": "http://www.adobe.com/support/security/bulletins/apsb11-16.html",
"refsource": "CONFIRM",
"url": "http://www.adobe.com/support/security/bulletins/apsb11-16.html"
},
{
"name": "TA11-166A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html"
},
{
"name": "1025658",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1025658"
},
{
"name": "oval:org.mitre.oval:def:14192",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14192"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538",
"assignerShortName": "adobe",
"cveId": "CVE-2011-2098",
"datePublished": "2011-06-16T23:00:00.000Z",
"dateReserved": "2011-05-13T00:00:00.000Z",
"dateUpdated": "2024-08-06T22:53:15.883Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CERTA-2011-ALE-003
Vulnerability from certfr_alerte - Published: 2011-04-12 - Updated: 2011-06-20
Une vulnérabilité permettant l'exécution de code arbitraire à distance affecte des produits Adobe. Elle est actuellement activement exploitée. L'éditeur a publié les correctifs pour toutes les versions concernées.
Description
Des produits Adobe sont vulnérables à une faille permettant à une personne malintentionnée d'exécuter du code arbitraire à distance.
L'éditeur rapporte que cette vulnérabilité est actuellement exploitée sur l'Internet, en particulier via des documents Microsoft Word spécialement conçus.
Mise à jour du 14 avril 2011 : l'éditeur annonce les dates de mise à disposition de correctifs suivantes :
- 15 avril 2011 pour Adobe Flash Player 10.2.x (tous les systèmes d'exploitation) ;
- semaine du 25 avril 2011 pour Adobe Reader 9.x, pour Windows et MacOS ;
- semaine du 25 avril pour Adobe Reader X (10.0.1) pour MacOS ;
- 14 juin 2011 pour Adobe Reader X (10.0.2) pour Windows.
Contournement provisoire
Il est possible de supprimer ou interdire l'accès à la DLL authplay.dll. Le Protected Mode inclus dans Adobe Reader X réduit les risques d'exploitation de la vulnérabilité.
Il est également recommandé d'utiliser un logiciel alternatif et à jour en attendant la publication du correctif.
Solution
Se référer aux bulletins de sécurité APSB11-07 et APSB11-16 (APSB11-16 inclut les corrections pour les vulnérabilités décrites dans les bulletins APSB11-06 et APSB11-08) de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Adobe | Acrobat | le composant authplay.dll contenu dans les versions 10.0.2 et antérieures de Adobe Acrobat et Reader pour les systèmes Windows et Macintosh. | ||
| Adobe | Acrobat | Adobe Flash Player 10.2.154.25 et antérieures pour les utilisateurs de Chrome ; | ||
| Adobe | Acrobat | Adobe Flash Player 10.2.153.1 et antérieures sur les systèmes Microsoft Windows, Linux et Oracle Solaris ; | ||
| Adobe | Acrobat | Adobe AIR versions 2.6.19120 et antérieures ; | ||
| Adobe | Acrobat | Adobe Flash Player 10.1.156.12 et antérieures sur les systèmes Android ; |
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "le composant authplay.dll contenu dans les versions 10.0.2 et ant\u00e9rieures de Adobe Acrobat et Reader pour les syst\u00e8mes Windows et Macintosh.",
"product": {
"name": "Acrobat",
"vendor": {
"name": "Adobe",
"scada": false
}
}
},
{
"description": "Adobe Flash Player 10.2.154.25 et ant\u00e9rieures pour les utilisateurs de Chrome ;",
"product": {
"name": "Acrobat",
"vendor": {
"name": "Adobe",
"scada": false
}
}
},
{
"description": "Adobe Flash Player 10.2.153.1 et ant\u00e9rieures sur les syst\u00e8mes Microsoft Windows, Linux et Oracle Solaris ;",
"product": {
"name": "Acrobat",
"vendor": {
"name": "Adobe",
"scada": false
}
}
},
{
"description": "Adobe AIR versions 2.6.19120 et ant\u00e9rieures ;",
"product": {
"name": "Acrobat",
"vendor": {
"name": "Adobe",
"scada": false
}
}
},
{
"description": "Adobe Flash Player 10.1.156.12 et ant\u00e9rieures sur les syst\u00e8mes Android ;",
"product": {
"name": "Acrobat",
"vendor": {
"name": "Adobe",
"scada": false
}
}
}
],
"affected_systems_content": null,
"closed_at": "2011-06-20",
"content": "## Description\n\nDes produits Adobe sont vuln\u00e9rables \u00e0 une faille permettant \u00e0 une\npersonne malintentionn\u00e9e d\u0027ex\u00e9cuter du code arbitraire \u00e0 distance.\n\nL\u0027\u00e9diteur rapporte que cette vuln\u00e9rabilit\u00e9 est actuellement exploit\u00e9e\nsur l\u0027Internet, en particulier via des documents Microsoft Word\nsp\u00e9cialement con\u00e7us.\n\n \n \n\n\u003cspan class=\"textbf\"\u003eMise \u00e0 jour du 14 avril 2011\u003c/span\u003e\u00a0: l\u0027\u00e9diteur\nannonce les dates de mise \u00e0 disposition de correctifs suivantes\u00a0:\n\n- 15 avril 2011 pour Adobe Flash Player 10.2.x (tous les syst\u00e8mes\n d\u0027exploitation)\u00a0;\n- semaine du 25 avril 2011 pour Adobe Reader 9.x, pour Windows et\n MacOS\u00a0;\n- semaine du 25 avril pour Adobe Reader X (10.0.1) pour MacOS\u00a0;\n- 14 juin 2011 pour Adobe Reader X (10.0.2) pour Windows.\n\n## Contournement provisoire\n\nIl est possible de supprimer ou interdire l\u0027acc\u00e8s \u00e0 la DLL authplay.dll.\nLe Protected Mode inclus dans Adobe Reader X r\u00e9duit les risques\nd\u0027exploitation de la vuln\u00e9rabilit\u00e9.\n\nIl est \u00e9galement recommand\u00e9 d\u0027utiliser un logiciel alternatif et \u00e0 jour\nen attendant la publication du correctif. \n\n## Solution\n\nSe r\u00e9f\u00e9rer aux bulletins de s\u00e9curit\u00e9 APSB11-07 et APSB11-16 (APSB11-16\ninclut les corrections pour les vuln\u00e9rabilit\u00e9s d\u00e9crites dans les\nbulletins APSB11-06 et APSB11-08) de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2011-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2097"
},
{
"name": "CVE-2011-0610",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0610"
},
{
"name": "CVE-2011-0611",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0611"
},
{
"name": "CVE-2011-2096",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2096"
},
{
"name": "CVE-2011-2105",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2105"
},
{
"name": "CVE-2011-2102",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2102"
},
{
"name": "CVE-2011-2100",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2100"
},
{
"name": "CVE-2011-2104",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2104"
},
{
"name": "CVE-2011-2103",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2103"
},
{
"name": "CVE-2011-2106",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2106"
},
{
"name": "CVE-2011-2101",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2101"
},
{
"name": "CVE-2011-2098",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2098"
},
{
"name": "CVE-2011-2099",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2099"
},
{
"name": "CVE-2011-2094",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2094"
},
{
"name": "CVE-2011-2095",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2095"
}
],
"initial_release_date": "2011-04-12T00:00:00",
"last_revision_date": "2011-06-20T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Adobe APSB11-07 du 15 avril 2011 :",
"url": "http://www.adobe.com/support/security/bulletins/apsb11-07.html"
},
{
"title": "Avis de s\u00e9curit\u00e9 du CERTA CERTA-2011-AVI-342 du 15 juin 2011 :",
"url": "http://www.certa.ssi.gouv.fr/site/CERTA-2011-AVI-342/index.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Adobe APSB11-16 du 14 juin 2011 :",
"url": "http://www.adobe.com/support/security/bulletins/apsb11-16.html"
},
{
"title": "Avis de s\u00e9curit\u00e9 du CERTA CERTA-2011-AVI-250 du 22 avril 2011 :",
"url": "http://www.certa.ssi.gouv.fr/site/CERTA-2011-AVI-250/index.html"
},
{
"title": "Avis de s\u00e9curit\u00e9 du CERTA CERTA-2011-AVI-234 du 19 avril 2011 :",
"url": "http://www.certa.ssi.gouv.fr/site/CERTA-2011-AVI-234/index.html"
},
{
"title": "Notes de version Google Chrome :",
"url": "http://googlechromereleases.blogspot.com/2011/04/stable-channel-update.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Adobe APSB11-08 du 21 avril 2011 :",
"url": "http://www.adobe.com/support/security/bulletins/apsb11-08.html"
},
{
"title": "Bulletin d\u0027alerte Adobe APSA11-02 du 11 avril 2011 :",
"url": "http://www.adobe.com/support/security/advisories/apsa11-02.html"
}
],
"reference": "CERTA-2011-ALE-003",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2011-04-12T00:00:00.000000"
},
{
"description": "annonce des dates de publication des correctifs.",
"revision_date": "2011-04-14T00:00:00.000000"
},
{
"description": "ajout du correctif Google Chrome.",
"revision_date": "2011-04-15T00:00:00.000000"
},
{
"description": "ajout du bulletin de s\u00e9curit\u00e9 Adobe APSB11-07, de Adobe AIR dans les produits vuln\u00e9rables et de la solution partielle.",
"revision_date": "2011-04-19T00:00:00.000000"
},
{
"description": "ajout du bulletin de s\u00e9curit\u00e9 Adobe APSB11-08, et des corrections Adobe Reader et Acrobat dans la solution partielle.",
"revision_date": "2011-04-22T00:00:00.000000"
},
{
"description": "ajout du bulletin de s\u00e9curit\u00e9 Adobe APSB11-16 proposant l\u0027ensemble des correctifs pour Adobe Reader et Acrobat.",
"revision_date": "2011-06-20T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 permettant l\u0027ex\u00e9cution de code arbitraire \u00e0 distance\naffecte des produits Adobe. Elle est actuellement activement exploit\u00e9e.\nL\u0027\u00e9diteur a publi\u00e9 les correctifs pour toutes les versions concern\u00e9es.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans Adobe Flash Player, Adobe Reader et Acrobat",
"vendor_advisories": [
{
"published_at": null,
"title": "Alerte de s\u00e9curit\u00e9 Adobe APSA11-02 du 11 avril 2011",
"url": null
}
]
}
FKIE_CVE-2011-2098
Vulnerability from fkie_nvd - Published: 2011-06-16 23:55 - Updated: 2025-04-11 00:51| URL | Tags | ||
|---|---|---|---|
| psirt@adobe.com | http://osvdb.org/73059 | ||
| psirt@adobe.com | http://www.adobe.com/support/security/bulletins/apsb11-16.html | Patch, Vendor Advisory | |
| psirt@adobe.com | http://www.securityfocus.com/bid/48245 | ||
| psirt@adobe.com | http://www.securitytracker.com/id?1025658 | ||
| psirt@adobe.com | http://www.us-cert.gov/cas/techalerts/TA11-166A.html | US Government Resource | |
| psirt@adobe.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/68012 | ||
| psirt@adobe.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14192 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/73059 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb11-16.html | Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/48245 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1025658 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA11-166A.html | US Government Resource | |
| af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/68012 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14192 |
| Vendor | Product | Version | |
|---|---|---|---|
| adobe | acrobat_reader | 8.0 | |
| adobe | acrobat_reader | 8.1 | |
| adobe | acrobat_reader | 8.1.1 | |
| adobe | acrobat_reader | 8.1.2 | |
| adobe | acrobat_reader | 8.1.3 | |
| adobe | acrobat_reader | 8.1.4 | |
| adobe | acrobat_reader | 8.1.5 | |
| adobe | acrobat_reader | 8.1.6 | |
| adobe | acrobat_reader | 8.1.7 | |
| adobe | acrobat_reader | 8.2 | |
| adobe | acrobat_reader | 8.2.1 | |
| adobe | acrobat_reader | 8.2.2 | |
| adobe | acrobat_reader | 8.2.3 | |
| adobe | acrobat_reader | 8.2.4 | |
| adobe | acrobat_reader | 8.2.6 | |
| adobe | acrobat_reader | 9.0 | |
| adobe | acrobat_reader | 9.1 | |
| adobe | acrobat_reader | 9.1.1 | |
| adobe | acrobat_reader | 9.1.2 | |
| adobe | acrobat_reader | 9.1.3 | |
| adobe | acrobat_reader | 9.2 | |
| adobe | acrobat_reader | 9.3 | |
| adobe | acrobat_reader | 9.3.1 | |
| adobe | acrobat_reader | 9.3.2 | |
| adobe | acrobat_reader | 9.3.3 | |
| adobe | acrobat_reader | 9.3.4 | |
| adobe | acrobat_reader | 9.4 | |
| adobe | acrobat_reader | 9.4.1 | |
| adobe | acrobat_reader | 9.4.2 | |
| adobe | acrobat_reader | 9.4.3 | |
| adobe | acrobat_reader | 9.4.4 | |
| adobe | acrobat_reader | 10.0 | |
| adobe | acrobat_reader | 10.0.1 | |
| adobe | acrobat_reader | 10.0.2 | |
| adobe | acrobat_reader | 10.0.3 | |
| apple | mac_os_x | * | |
| microsoft | windows | * | |
| adobe | acrobat | 8.0 | |
| adobe | acrobat | 8.1 | |
| adobe | acrobat | 8.1.1 | |
| adobe | acrobat | 8.1.2 | |
| adobe | acrobat | 8.1.3 | |
| adobe | acrobat | 8.1.4 | |
| adobe | acrobat | 8.1.5 | |
| adobe | acrobat | 8.1.6 | |
| adobe | acrobat | 8.1.7 | |
| adobe | acrobat | 8.2 | |
| adobe | acrobat | 8.2.1 | |
| adobe | acrobat | 8.2.2 | |
| adobe | acrobat | 8.2.3 | |
| adobe | acrobat | 8.2.4 | |
| adobe | acrobat | 8.2.5 | |
| adobe | acrobat | 8.2.6 | |
| adobe | acrobat | 9.0 | |
| adobe | acrobat | 9.1 | |
| adobe | acrobat | 9.1.1 | |
| adobe | acrobat | 9.1.2 | |
| adobe | acrobat | 9.1.3 | |
| adobe | acrobat | 9.2 | |
| adobe | acrobat | 9.3 | |
| adobe | acrobat | 9.3.1 | |
| adobe | acrobat | 9.3.2 | |
| adobe | acrobat | 9.3.3 | |
| adobe | acrobat | 9.3.4 | |
| adobe | acrobat | 9.4 | |
| adobe | acrobat | 9.4.1 | |
| adobe | acrobat | 9.4.2 | |
| adobe | acrobat | 9.4.3 | |
| adobe | acrobat | 9.4.4 | |
| adobe | acrobat | 10.0 | |
| adobe | acrobat | 10.0.1 | |
| adobe | acrobat | 10.0.2 | |
| adobe | acrobat | 10.0.3 | |
| apple | mac_os_x | * | |
| microsoft | windows | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:acrobat_reader:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "996EB48E-D2A8-49E4-915A-EBDE26A9FB94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat_reader:8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "97E20936-EE31-4CEB-A710-3165A28BAD69",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat_reader:8.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5BD9952C-A1D0-4DFB-A292-9B86D7EAE5FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat_reader:8.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "C5BEA847-A71E-4336-AB67-B3C38847C1C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat_reader:8.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4D198253-0E52-4E7F-AA01-CA82B96CD5BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat_reader:8.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "39F6994B-6969-485B-9286-2592B11A47BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat_reader:8.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "FC533775-B52E-43F0-BF19-1473BE36232D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat_reader:8.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "18D1C85E-42CC-46F2-A7B6-DAC3C3995330",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat_reader:8.1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "C4670451-511E-496C-A78A-887366E1E992",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat_reader:8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1A2A4F62-7AB5-4134-9A65-4B4E1EA262A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat_reader:8.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "35994F76-CD13-4301-9134-FC0CBEA37D97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat_reader:8.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "0FB61191-F955-4DE6-A86B-36E031DE1F99",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat_reader:8.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E32D68D5-6A79-454B-B14F-9BC865413E3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat_reader:8.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "2A57581C-A139-41C3-B9DB-0C4CFA7A1BB2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat_reader:8.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "8028BBB6-47A0-4BEF-BC43-58E19EC73480",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "562772F1-1627-438E-A6B8-7D1AA5536086",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "27D5AF92-A8E1-41BD-B20A-EB26BB6AD4DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F25C9167-C6D4-4264-9197-50878EDA2D96",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "DD1D7308-09E9-42B2-8836-DC2326C62A9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat_reader:9.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B5C251D2-4C9B-4029-8BED-0FCAED3B8E89",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat_reader:9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2432AC17-5378-4C61-A775-5172FD44EC03",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat_reader:9.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B6BA82F4-470D-4A46-89B2-D2F3C8FA31C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat_reader:9.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "39EDED39-664F-4B68-B422-2CCCA3B83550",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat_reader:9.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B508C5CE-1386-47B3-B301-B78DBB3A75D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat_reader:9.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "DDC2EEB6-D5EC-430F-962A-1279C9970441",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat_reader:9.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "8DC590C7-5BDE-4E46-9605-01E95B17F01F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat_reader:9.4:*:*:*:*:*:*:*",
"matchCriteriaId": "DCFE67F4-6907-4967-96A3-1757EADA72BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat_reader:9.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "41DFBB39-4BC6-48BB-B66E-99DA4C7DBCE4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat_reader:9.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A328CC7F-5D02-4C7C-82CE-139EB2689C18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat_reader:9.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0F56EC75-4C65-4CD7-981D-823E1411CD6F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat_reader:9.4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "1E2D30C1-BDE8-4C1C-A8B3-A635A74E5D94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat_reader:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9731EFE2-A5BE-4389-A92D-DDC573633B6C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat_reader:10.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F9B4B357-27C7-4926-936C-A100A7AD538B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat_reader:10.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4DEE3D3B-C94C-4A85-B2C2-E4A72A88F4FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat_reader:10.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "978027C8-4DF6-4C18-A31D-1ACFBA857E9F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:acrobat:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "26AE76F7-D7F6-4AF2-A5C6-708B5642C288",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat:8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "749FFB51-65D4-4A4B-95F3-742440276897",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat:8.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C8665E53-EC1E-4B95-9064-2565BC12113E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat:8.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "24218FDA-F9DA-465A-B5D5-76A55C7EE04E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat:8.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E2C5F1C5-85CD-47B9-897F-E51D6902AF72",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat:8.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E0E190FF-3EBC-44AB-8072-4D964E843E8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat:8.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "6A624D44-C135-4ED3-9BA4-F4F8A044850B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat:8.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "B95C0A99-42E4-40A9-BF61-507E4E4DC052",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat:8.1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "3B9F55CC-3681-4A67-99D1-3F40447392D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat:8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A9C0AC89-804B-44A1-929A-118993B6BAA7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat:8.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "39B174C3-1BA6-4654-BFA4-CC126454E147",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat:8.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6ACDAA2B-3977-4590-9F16-5DDB6FF6545B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat:8.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "BB7C4E07-0909-4114-BBFB-92626AFC49BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat:8.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7832B75B-7868-44DE-A9A4-CBD9CC117DB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat:8.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "EF3AB98B-E881-4992-B709-4EE7FEDFD696",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat:8.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "8482E880-29DD-4B4D-9D1F-3FAD2849CD99",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5AA53564-9ACD-4CFB-9AAC-A77440026A57",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C7EC46E3-77B7-4455-B3E0-A45C6B69B3DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4F475858-DCE2-4C93-A51A-04718DF17593",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "88687272-4CD0-42A2-B727-C322ABDE3549",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat:9.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "1E5C4FA4-3786-47AF-BD7D-8E75927EB3AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat:9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B35CC915-EEE3-4E86-9E09-1893C725E07B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat:9.3:*:*:*:*:*:*:*",
"matchCriteriaId": "76201694-E5C5-4CA3-8919-46937AFDAAE3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat:9.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "397AB988-1C2C-4247-9B34-806094197CB5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat:9.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "8FA0B8C3-8060-4685-A241-9852BD63B7A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat:9.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4AB9BBDE-634A-47CF-BA49-67382B547900",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat:9.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F56B1726-4F05-4732-9D8B-077EF593EAEC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat:9.4:*:*:*:*:*:*:*",
"matchCriteriaId": "A258374F-55CB-48D2-9094-CD70E1288F60",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat:9.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "627B0DA4-E600-49F1-B455-B4E151B33236",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat:9.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "54BD8F96-BB75-4961-B1E0-049F2273100D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat:9.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "9C14B310-65F0-475D-A2DD-0AD706805A99",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat:9.4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "356A0FAF-A25C-4D11-A70F-94B311B5778E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B57C5136-7853-478B-A342-6013528B41B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat:10.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "CC1E1EE7-379E-4047-962D-0A311EB0DB1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat:10.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "C113D6BE-88CD-4670-A0FA-8E78EBAF9A81",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:acrobat:10.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E4FC7DF0-7006-4805-9CA3-9A950DAA8D51",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Adobe Reader and Acrobat 8.x before 8.3, 9.x before 9.4.5, and 10.x before 10.1 on Windows and Mac OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2099."
},
{
"lang": "es",
"value": "Adobe Reader y Acrobat v8.x anterior a v8.3, v9.x anterior a v9.4.5, y 10.x anterior a v10.1 sobre Windows y Mac OS X permite a atacantes ejecutar c\u00f3digo de su elecci\u00f3n o provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente que CVE-2011-2099."
}
],
"id": "CVE-2011-2098",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2011-06-16T23:55:01.730",
"references": [
{
"source": "psirt@adobe.com",
"url": "http://osvdb.org/73059"
},
{
"source": "psirt@adobe.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.adobe.com/support/security/bulletins/apsb11-16.html"
},
{
"source": "psirt@adobe.com",
"url": "http://www.securityfocus.com/bid/48245"
},
{
"source": "psirt@adobe.com",
"url": "http://www.securitytracker.com/id?1025658"
},
{
"source": "psirt@adobe.com",
"tags": [
"US Government Resource"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html"
},
{
"source": "psirt@adobe.com",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68012"
},
{
"source": "psirt@adobe.com",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14192"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://osvdb.org/73059"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.adobe.com/support/security/bulletins/apsb11-16.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/48245"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1025658"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68012"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14192"
}
],
"sourceIdentifier": "psirt@adobe.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CERTA-2011-AVI-342
Vulnerability from certfr_avis - Published: 2011-06-15 - Updated: 2011-06-15
De multiples vulnérabilités ont été corrigées dans les produits Adobe Acrobat et Reader. Une large partie d'entre elles permettent à un attaquant de provoquer l'arrêt inopiné de l'application, et pourraient mener à l'exécution de code arbitraire à distance.
Description
La mise à jour corrige 13 vulnérabilités dans les produits Adobe Acrobat et Reader:
- quatre d'entre elles permettraient à un attaquant de réaliser l'exécution de code à distance par le biais de dépassement de mémoire tampon (CVE-2011-2094, CVE-2011-2095, CVE-2011-2097) et d'un débordement de tas (CVE-2011-2096) ;
- deux permettraient l'exécution de code arbitraire à distance par corruption de la mémoire (CVE-2011-2098, CVE-2011-2099), une troisième n'affecte que les versions 8.x (CVE-2011-2103) et une quatrième n'affecte que les versions Macintosh des deux produits (CVE-2011-2106) ;
- une erreur dans le chargement de DLL permet l'exécution de code arbitraire à distance (CVE-2011-2100) ;
- certaines entrées ne sont pas suffisamment validées et permettent l'exécution de code par rebond (CVE-2011-2101) ;
- une vulnérabilité non spécifiée n'affectant que les versions 10.x permet le contournement de certaines restrictions (CVE-2011-2102) ;
- deux corruptions de mémoire entrainant une fermeture inopinée ont enfin été corrigées (CVE-2011-2104 et CVE-2011-2105).
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Adobe | Acrobat | Adobe Reader X pour Macintosh, versions 10.x jusqu'à 10.0.3 inclue ; | ||
| Adobe | Acrobat | Adobe Acrobat X pour Windows et Macintosh, versions 10.x jusqu'à 10.0.3 inclue ; | ||
| Adobe | Acrobat | Adobe Reader X pour Windows, versions 10.x jusqu'à 10.0.1 inclue ; | ||
| Adobe | Acrobat | Adobe Reader 9 pour Windows et Macintosh, versions 9.x jusqu'à 9.4.4 inclue ; | ||
| Adobe | Acrobat | Adobe Acrobat 9 pour Windows et Macintosh, versions 9.x jusqu'à 9.4.4 inclue ; | ||
| Adobe | Acrobat | Adobe Acrobat 8 pour Windows et Macintosh, versions 8.x jusqu'à 8.2.6 inclue. | ||
| Adobe | Acrobat | Adobe Reader 8 pour Windows et Macintosh, versions 8.x jusqu'à 8.2.6 inclue ; |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Adobe Reader X pour Macintosh, versions 10.x jusqu\u0027\u00e0 10.0.3 inclue ;",
"product": {
"name": "Acrobat",
"vendor": {
"name": "Adobe",
"scada": false
}
}
},
{
"description": "Adobe Acrobat X pour Windows et Macintosh, versions 10.x jusqu\u0027\u00e0 10.0.3 inclue ;",
"product": {
"name": "Acrobat",
"vendor": {
"name": "Adobe",
"scada": false
}
}
},
{
"description": "Adobe Reader X pour Windows, versions 10.x jusqu\u0027\u00e0 10.0.1 inclue ;",
"product": {
"name": "Acrobat",
"vendor": {
"name": "Adobe",
"scada": false
}
}
},
{
"description": "Adobe Reader 9 pour Windows et Macintosh, versions 9.x jusqu\u0027\u00e0 9.4.4 inclue ;",
"product": {
"name": "Acrobat",
"vendor": {
"name": "Adobe",
"scada": false
}
}
},
{
"description": "Adobe Acrobat 9 pour Windows et Macintosh, versions 9.x jusqu\u0027\u00e0 9.4.4 inclue ;",
"product": {
"name": "Acrobat",
"vendor": {
"name": "Adobe",
"scada": false
}
}
},
{
"description": "Adobe Acrobat 8 pour Windows et Macintosh, versions 8.x jusqu\u0027\u00e0 8.2.6 inclue.",
"product": {
"name": "Acrobat",
"vendor": {
"name": "Adobe",
"scada": false
}
}
},
{
"description": "Adobe Reader 8 pour Windows et Macintosh, versions 8.x jusqu\u0027\u00e0 8.2.6 inclue ;",
"product": {
"name": "Acrobat",
"vendor": {
"name": "Adobe",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nLa mise \u00e0 jour corrige 13 vuln\u00e9rabilit\u00e9s dans les produits Adobe Acrobat\net Reader:\n\n- quatre d\u0027entre elles permettraient \u00e0 un attaquant de r\u00e9aliser\n l\u0027ex\u00e9cution de code \u00e0 distance par le biais de d\u00e9passement de\n m\u00e9moire tampon (CVE-2011-2094, CVE-2011-2095, CVE-2011-2097) et d\u0027un\n d\u00e9bordement de tas (CVE-2011-2096) ;\n- deux permettraient l\u0027ex\u00e9cution de code arbitraire \u00e0 distance par\n corruption de la m\u00e9moire (CVE-2011-2098, CVE-2011-2099), une\n troisi\u00e8me n\u0027affecte que les versions 8.x (CVE-2011-2103) et une\n quatri\u00e8me n\u0027affecte que les versions Macintosh des deux produits\n (CVE-2011-2106) ;\n- une erreur dans le chargement de DLL permet l\u0027ex\u00e9cution de code\n arbitraire \u00e0 distance (CVE-2011-2100) ;\n- certaines entr\u00e9es ne sont pas suffisamment valid\u00e9es et permettent\n l\u0027ex\u00e9cution de code par rebond (CVE-2011-2101) ;\n- une vuln\u00e9rabilit\u00e9 non sp\u00e9cifi\u00e9e n\u0027affectant que les versions 10.x\n permet le contournement de certaines restrictions (CVE-2011-2102) ;\n- deux corruptions de m\u00e9moire entrainant une fermeture inopin\u00e9e ont\n enfin \u00e9t\u00e9 corrig\u00e9es (CVE-2011-2104 et CVE-2011-2105).\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2011-2094",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2094"
},
{
"name": "CVE-2011-2099",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2099"
},
{
"name": "CVE-2011-2104",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2104"
},
{
"name": "CVE-2011-2095",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2095"
},
{
"name": "CVE-2011-2101",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2101"
},
{
"name": "CVE-2011-2096",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2096"
},
{
"name": "CVE-2011-2105",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2105"
},
{
"name": "CVE-2011-2100",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2100"
},
{
"name": "CVE-2011-2102",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2102"
},
{
"name": "CVE-2011-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2097"
},
{
"name": "CVE-2011-2106",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2106"
},
{
"name": "CVE-2011-2103",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2103"
},
{
"name": "CVE-2011-2098",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2098"
}
],
"initial_release_date": "2011-06-15T00:00:00",
"last_revision_date": "2011-06-15T00:00:00",
"links": [],
"reference": "CERTA-2011-AVI-342",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2011-06-15T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans les produits Adobe\nAcrobat et Reader. Une large partie d\u0027entre elles permettent \u00e0 un\nattaquant de provoquer l\u0027arr\u00eat inopin\u00e9 de l\u0027application, et pourraient\nmener \u00e0 l\u0027ex\u00e9cution de code arbitraire \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Adobe Reader et Acrobat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Adobe apsb11-16 du 15 juin 2011",
"url": "http://www.adobe.com/support/security/bulletins/apsb11-16.html"
}
]
}
GHSA-XVHQ-QX4P-J8J9
Vulnerability from github – Published: 2022-05-17 01:01 – Updated: 2022-05-17 01:01Adobe Reader and Acrobat 8.x before 8.3, 9.x before 9.4.5, and 10.x before 10.1 on Windows and Mac OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2099.
{
"affected": [],
"aliases": [
"CVE-2011-2098"
],
"database_specific": {
"cwe_ids": [
"CWE-119"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2011-06-16T23:55:00Z",
"severity": "HIGH"
},
"details": "Adobe Reader and Acrobat 8.x before 8.3, 9.x before 9.4.5, and 10.x before 10.1 on Windows and Mac OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2099.",
"id": "GHSA-xvhq-qx4p-j8j9",
"modified": "2022-05-17T01:01:40Z",
"published": "2022-05-17T01:01:40Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2098"
},
{
"type": "WEB",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68012"
},
{
"type": "WEB",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14192"
},
{
"type": "WEB",
"url": "http://osvdb.org/73059"
},
{
"type": "WEB",
"url": "http://www.adobe.com/support/security/bulletins/apsb11-16.html"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/48245"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id?1025658"
},
{
"type": "WEB",
"url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html"
}
],
"schema_version": "1.4.0",
"severity": []
}
GSD-2011-2098
Vulnerability from gsd - Updated: 2023-12-13 01:19{
"GSD": {
"alias": "CVE-2011-2098",
"description": "Adobe Reader and Acrobat 8.x before 8.3, 9.x before 9.4.5, and 10.x before 10.1 on Windows and Mac OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2099.",
"id": "GSD-2011-2098",
"references": [
"https://access.redhat.com/errata/RHSA-2011:1434"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2011-2098"
],
"details": "Adobe Reader and Acrobat 8.x before 8.3, 9.x before 9.4.5, and 10.x before 10.1 on Windows and Mac OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2099.",
"id": "GSD-2011-2098",
"modified": "2023-12-13T01:19:06.692185Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2011-2098",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Adobe Reader and Acrobat 8.x before 8.3, 9.x before 9.4.5, and 10.x before 10.1 on Windows and Mac OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2099."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "48245",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/48245"
},
{
"name": "adobe-reader-ce(68012)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68012"
},
{
"name": "73059",
"refsource": "OSVDB",
"url": "http://osvdb.org/73059"
},
{
"name": "http://www.adobe.com/support/security/bulletins/apsb11-16.html",
"refsource": "CONFIRM",
"url": "http://www.adobe.com/support/security/bulletins/apsb11-16.html"
},
{
"name": "TA11-166A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html"
},
{
"name": "1025658",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1025658"
},
{
"name": "oval:org.mitre.oval:def:14192",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14192"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:8.1.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:8.1.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:8.2.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:8.2.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:9.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:9.3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:9.4.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:9.4.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:8.1.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:8.1.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:8.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:9.3.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:9.3.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:10.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:10.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:8.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:8.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:8.2.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:8.2.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:9.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:9.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:9.4.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:9.4.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:8.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:8.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:8.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:8.2.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:9.3.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:9.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:10.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:10.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat:8.1.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat:8.1.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat:8.2.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat:8.2.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat:8.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat:8.1.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat:8.2.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat:8.2.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat:9.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat:9.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat:9.4.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat:9.4.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat:8.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat:8.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat:8.1.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat:8.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat:9.3.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat:9.3.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat:9.3.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat:10.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat:10.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat:9.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat:9.3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat:9.4.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat:10.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat:8.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat:8.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat:8.2.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat:8.2.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat:9.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat:9.4.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:acrobat:10.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2011-2098"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Adobe Reader and Acrobat 8.x before 8.3, 9.x before 9.4.5, and 10.x before 10.1 on Windows and Mac OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2099."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.adobe.com/support/security/bulletins/apsb11-16.html",
"refsource": "CONFIRM",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.adobe.com/support/security/bulletins/apsb11-16.html"
},
{
"name": "1025658",
"refsource": "SECTRACK",
"tags": [],
"url": "http://www.securitytracker.com/id?1025658"
},
{
"name": "48245",
"refsource": "BID",
"tags": [],
"url": "http://www.securityfocus.com/bid/48245"
},
{
"name": "73059",
"refsource": "OSVDB",
"tags": [],
"url": "http://osvdb.org/73059"
},
{
"name": "TA11-166A",
"refsource": "CERT",
"tags": [
"US Government Resource"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA11-166A.html"
},
{
"name": "adobe-reader-ce(68012)",
"refsource": "XF",
"tags": [],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68012"
},
{
"name": "oval:org.mitre.oval:def:14192",
"refsource": "OVAL",
"tags": [],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14192"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": true
}
},
"lastModifiedDate": "2017-09-19T01:32Z",
"publishedDate": "2011-06-16T23:55Z"
}
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.