Vulnerability Details : CVE-2010-1297
Public exploit exists!
Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64; Adobe AIR before 2.0.2.12610; and Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted SWF content, related to authplay.dll and the ActionScript Virtual Machine 2 (AVM2) newfunction instruction, as exploited in the wild in June 2010.
Vulnerability category: Memory CorruptionExecute codeDenial of service
CVE-2010-1297 is in the CISA Known Exploited Vulnerabilities Catalog
CISA vulnerability name:
Adobe Flash Player Memory Corruption Vulnerability
CISA required action:
The impacted product is end-of-life and should be disconnected if still in use.
CISA description:
Adobe Flash Player contains a memory corruption vulnerability that allows remote attackers to execute code or cause denial-of-service (DoS).
Added on
2022-06-08
Action due date
2022-06-22
Exploit prediction scoring system (EPSS) score for CVE-2010-1297
Probability of exploitation activity in the next 30 days: 35.54%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 97 % EPSS Score History EPSS FAQ
Metasploit modules for CVE-2010-1297
-
Adobe Flash Player "newfunction" Invalid Pointer Use
Disclosure Date: 2010-06-04First seen: 2020-04-26exploit/windows/browser/adobe_flashplayer_newfunctionThis module exploits a vulnerability in the DoABC tag handling within versions 9.x and 10.0 of Adobe Flash Player. Adobe Reader and Acrobat are also vulnerable, as are any other applications that may embed Flash player. Arbitrary code execution is achieved by embe -
Adobe Flash Player "newfunction" Invalid Pointer Use
Disclosure Date: 2010-06-04First seen: 2020-04-26exploit/windows/fileformat/adobe_flashplayer_newfunctionThis module exploits a vulnerability in the DoABC tag handling within versions 9.x and 10.0 of Adobe Flash Player. Adobe Reader and Acrobat are also vulnerable, as are any other applications that may embed Flash player. Arbitrary code execution is achieved by embe
CVSS scores for CVE-2010-1297
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST |
References for CVE-2010-1297
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7116
Repository / Oval Repository
-
http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html
[security-announce] SUSE Security Summary Report: SUSE-SR:2010:013
-
http://www.securityfocus.com/bid/40586
Adobe Flash Player, Reader, and Acrobat 'authplay.dll' Remote Code Execution Vulnerability
-
http://www.vupen.com/english/advisories/2010/1453
Webmail | OVH- OVH
-
http://www.adobe.com/support/security/bulletins/apsb10-15.html
Adobe - Security Bulletins: APSB10-15 - Security updates available for Adobe Reader and Acrobat
-
http://www.vupen.com/english/advisories/2010/1793
Webmail | OVH- OVH
- http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
-
http://www.vupen.com/english/advisories/2010/1432
Webmail | OVH- OVH
-
http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
Apple - Lists.apple.com
-
http://www.exploit-db.com/exploits/13787
Adobe Flash / Reader - Live Malware - Multiple remote Exploit
-
http://www.redhat.com/support/errata/RHSA-2010-0470.html
Support
-
http://securitytracker.com/id?1024085
Adobe Flash Player Multiple Flaws Let Remote Users Execute Arbitary Code, Conduct Cross-Site Scripting Attacks, and Deny Service - SecurityTracker
-
http://security.gentoo.org/glsa/glsa-201101-09.xml
Adobe Flash Player: Multiple vulnerabilities (GLSA 201101-09) — Gentoo security
-
http://securitytracker.com/id?1024057
Adobe Flash Player Flaw in 'authplay.dll' Lets Remote Users Execute Arbitrary Code - SecurityTracker
-
http://community.websense.com/blogs/securitylabs/archive/2010/06/09/having-fun-with-adobe-0-day-exploits.aspx
Home | Forcepoint Support
-
http://www.us-cert.gov/cas/techalerts/TA10-159A.html
Adobe Flash, Reader, and Acrobat Vulnerability | CISAUS Government Resource
-
http://www.vupen.com/english/advisories/2010/1482
Webmail | OVH- OVH
-
http://www.us-cert.gov/cas/techalerts/TA10-162A.html
Adobe Flash and AIR Vulnerabilities | CISAUS Government Resource
-
http://www.adobe.com/support/security/advisories/apsa10-01.html
Adobe - Security Advisories: Security Advisory for Flash Player, Adobe Reader and AcrobatVendor Advisory
-
http://www.kb.cert.org/vuls/id/486225
VU#486225 - Adobe Flash ActionScript AVM2 newfunction vulnerabilityUS Government Resource
-
http://www.vupen.com/english/advisories/2010/1636
Webmail | OVH- OVH
-
http://support.apple.com/kb/HT4435
We're sorry.
-
http://securitytracker.com/id?1024058
Adobe Reader and Acrobat Flaw in 'authplay.dll' Lets Remote Users Execute Arbitrary Code - SecurityTracker
-
http://www.vupen.com/english/advisories/2010/1349
Webmail | OVH- OVHVendor Advisory
-
http://www.vupen.com/english/advisories/2010/1522
Webmail | OVH- OVH
-
http://www.vupen.com/english/advisories/2010/1434
Webmail | OVH- OVH
-
http://securitytracker.com/id?1024086
Adobe AIR Multiple Flaws Let Remote Users Execute Arbitary Code, Conduct Cross-Site Scripting Attacks, and Deny Service - SecurityTracker
-
http://www.redhat.com/support/errata/RHSA-2010-0464.html
Support
- http://www.turbolinux.co.jp/security/2010/TLSA-2010-19j.txt
-
http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00000.html
[security-announce] SUSE Security Announcement: flash player (SUSE-SA:20
-
http://www.securityfocus.com/bid/40759
RETIRED: Adobe Flash Player 10.0.45.2 and AIR 1.5.3.9130 Multiple Remote Vulnerabilities
-
http://www.vupen.com/english/advisories/2011/0192
Webmail | OVH- OVH
-
http://www.vupen.com/english/advisories/2010/1348
Webmail | OVH- OVHVendor Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/59137
Adobe Acrobat and Reader authplay.dll code execution CVE-2010-1297 Vulnerability Report
-
http://www.vupen.com/english/advisories/2010/1421
Webmail | OVH- OVH
-
http://blog.zynamics.com/2010/06/09/analyzing-the-currently-exploited-0-day-for-adobe-reader-and-adobe-flash/
A brief analysis of a malicious PDF file which exploits this week's Flash 0-day « blog.zynamics.com
-
http://www.adobe.com/support/security/bulletins/apsb10-14.html
Adobe - Security Bulletins: APSB10-14 Security update available for Adobe Flash Player
Products affected by CVE-2010-1297
- cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:9.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:9.3:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:9.2:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:9.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.2:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.3:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:flash_player:9.0.124.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:flash_player:10.0.12.10:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:flash_player:10.0.0.584:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:flash_player:9.0.159.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:flash_player:10.0.22.87:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:flash_player:10.0.12.36:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:flash_player:9.0.125.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:flash_player:9.0.260.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:flash_player:9.0.246.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:flash_player:9.0.152.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:flash_player:9.0.151.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:flash_player:10.0.42.34:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:flash_player:10.0.15.3:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:flash_player:10.0.32.18:*:*:*:*:*:*:*