Vulnerability Name:

CVE-2010-0189 (CCN-56370)

Assigned:2010-02-18
Published:2010-02-18
Updated:2017-09-19
Summary:A certain ActiveX control in NOS Microsystems getPlus Download Manager (aka DLM or Downloader) 1.5.2.35, as used in Adobe Download Manager, improperly validates requests involving web sites that are not in subdomains, which allows remote attackers to force the download and installation of arbitrary programs via a crafted name for a download site.
Per: http://blogs.adobe.com/psirt/2010/02/adobe_download_manager_issue.html



"Adobe is aware of the recently posted report of a remote code execution vulnerability in the Adobe Download Manager."
CVSS v3 Severity:10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
6.9 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
9.3 High (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
6.9 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-20
Vulnerability Consequences:Gain Access
References:Source: CCN
Type: Aviv Raff On .NET
Skeletons in Adobe's security closet

Source: MISC
Type: UNKNOWN
http://aviv.raffon.net/2010/02/18/SkeletonsInAdobesSecurityCloset.aspx

Source: MISC
Type: UNKNOWN
http://blogs.adobe.com/psirt/2010/02/adobe_download_manager_issue.html

Source: MISC
Type: UNKNOWN
http://blogs.zdnet.com/security/?p=5505

Source: MITRE
Type: CNA
CVE-2010-0189

Source: IDEFENSE
Type: UNKNOWN
20100223 Multiple Vendor NOS Microsystems getPlus Downloader Input Validation Vulnerability

Source: CCN
Type: SA38729
Adobe getPlus DLM Unauthorised Installation Vulnerability

Source: SECUNIA
Type: Vendor Advisory
38729

Source: CCN
Type: SECTRACK ID: 1023651
Adobe Download Manager Flaw Lets Remote Users Download and Install Arbitrary Software

Source: SECTRACK
Type: UNKNOWN
1023651

Source: CCN
Type: Adobe Product Security Bulletin APSB10-08
Security update available for Adobe Download Manager

Source: CONFIRM
Type: Patch, Vendor Advisory
http://www.adobe.com/support/security/bulletins/apsb10-08.html

Source: MISC
Type: UNKNOWN
http://www.akitasecurity.nl/advisory.php?id=AK20090401

Source: CCN
Type: NOS Microsystems Web site
getPlus

Source: OSVDB
Type: UNKNOWN
62547

Source: CCN
Type: OSVDB ID: 62547
Adobe getPlus DLM (Download Manager) on Windows getPlus Downloader Software Installation Authorization Weakness

Source: BID
Type: UNKNOWN
38313

Source: CCN
Type: BID-38313
NOS getPlus Downloader Domain Validation Arbitrary File Download Vulnerability

Source: VUPEN
Type: Vendor Advisory
ADV-2010-0459

Source: XF
Type: UNKNOWN
getplus-dlmanager-code-execution(56370)

Source: XF
Type: UNKNOWN
adobe-dlmanager-unspecified-file-download(56370)

Source: CCN
Type: iDefense Labs Public Advisory: 02.23.10
Multiple Vendor NOS Microsystems getPlus Downloader Input Validation Vulnerability

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:7182

Vulnerable Configuration:Configuration 1:
  • cpe:/a:nos_microsystems:getplus_download_manager:1.5.2.35:*:*:*:*:*:*:*
  • AND
  • cpe:/a:adobe:download_manager:*:*:*:*:*:*:*:* (Version <= 1.6.2.60)

  • Configuration CCN 1:
  • cpe:/a:adobe:acrobat:8.0::standard:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:8.1::standard:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:8.1.1::standard:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:8.1.2::standard:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:8.0::professional:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:8.1.1::professional:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:8.1.2::professional:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:9.0::professional:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:9.0::standard:*:*:*:*:*
  • OR cpe:/a:adobe:reader:8.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:reader:9.0:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:reader:8.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:reader:8.1.4:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:reader:9.1:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:reader:9.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:8.1.4::standard:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:8.1.3::standard:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:9.1::standard:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:8.1.2:security_update:professional:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:8.1.3::professional:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:8.1.4::professional:*:*:*:*:*
  • OR cpe:/a:adobe:reader:9.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:reader:9.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:reader:8.1.6:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:reader:8.1.7:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:reader:9.2:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:reader:8.1.5:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:reader:9.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:spelling_dictionaries_support_for_adobe_reader:8.0.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.mitre.oval:def:7182
    V
    ActiveX control in NOS Microsystems getPlus Download Manager Vulnerability
    2014-06-30
    BACK
    nos_microsystems getplus download manager 1.5.2.35
    adobe download manager *
    adobe acrobat 8.0
    adobe acrobat 8.1
    adobe acrobat 8.1.1
    adobe acrobat 8.1.2
    adobe acrobat 8.0
    adobe acrobat 8.1.1
    adobe acrobat 8.1.2
    adobe acrobat 9.0
    adobe acrobat 9.0
    adobe reader 8.1.1
    adobe reader 9.0
    adobe reader 8.1.2
    adobe reader 8.1.4
    adobe reader 9.1
    adobe reader 9.1.1
    adobe acrobat 8.1.4
    adobe acrobat 8.1.3
    adobe acrobat 9.1
    adobe acrobat 8.1.2 security_update
    adobe acrobat 8.1.3
    adobe acrobat 8.1.4
    adobe reader 9.1.2
    adobe reader 9.1.3
    adobe reader 8.1.6
    adobe reader 8.1.7
    adobe reader 9.2
    adobe reader 8.1.5
    adobe reader 9.3.1
    adobe spelling dictionaries support for adobe reader 8.0.0