Vulnerability Name: | CVE-2010-0128 (CCN-58442) | ||||||||
Assigned: | 2010-05-11 | ||||||||
Published: | 2010-05-11 | ||||||||
Updated: | 2022-04-22 | ||||||||
Summary: | Integer signedness error in dirapi.dll in Adobe Shockwave Player before 11.5.7.609 and Adobe Director before 11.5.7.609 allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted .dir file that triggers an invalid read operation. | ||||||||
CVSS v3 Severity: | 10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||||
CVSS v2 Severity: | 9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C) 6.9 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
6.9 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
| ||||||||
Vulnerability Type: | CWE-787 | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: MITRE Type: CNA CVE-2010-0128 Source: CCN Type: SA38751 Adobe Shockwave Player Multiple Vulnerabilities Source: SECUNIA Type: Broken Link, Vendor Advisory 38751 Source: MISC Type: Broken Link, Vendor Advisory http://secunia.com/secunia_research/2010-19/ Source: CCN Type: Adobe Product Security Bulletin APSB10-12 Security update available for Shockwave Player Source: CONFIRM Type: Patch, Vendor Advisory http://www.adobe.com/support/security/bulletins/apsb10-12.html Source: MISC Type: Broken Link http://www.coresecurity.com/content/adobe-director-invalid-read Source: CCN Type: OSVDB ID: 64641 Adobe Shockwave Player / Director dirapi.dll Crafted DIR File Memory Corruption Source: BUGTRAQ Type: Broken Link, VDB Entry 20100511 [CORE-2010-0405] Adobe Director Invalid Read Source: BUGTRAQ Type: Broken Link, VDB Entry 20100512 Secunia Research: Adobe Shockwave Player Signedness Error Vulnerability Source: CCN Type: BID-40076 Adobe Shockwave Player 'DIRAPI.dll' Remote Code Execution Vulnerability Source: VUPEN Type: Broken Link, Vendor Advisory ADV-2010-1128 Source: XF Type: UNKNOWN shockwave-dirapi-code-execution(58442) Source: OVAL Type: Tool Signature oval:org.mitre.oval:def:7273 | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration CCN 1: ![]() | ||||||||
Oval Definitions | |||||||||
| |||||||||
BACK |