9.3
CVSSv2

CVE-2010-0188

Published: 22/02/2010 Updated: 19/09/2017
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 951
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Unspecified vulnerability in Adobe Reader and Acrobat 8.x prior to 8.2.1 and 9.x prior to 9.3.1 allows malicious users to cause a denial of service (application crash) or possibly execute arbitrary code via unknown vectors.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

adobe acrobat reader 8.1

adobe acrobat reader 8.0

adobe acrobat reader 8.1.7

adobe acrobat reader 9.0

adobe acrobat reader 8.1.5

adobe acrobat reader 8.1.6

adobe acrobat reader 9.2

adobe acrobat reader 9.3

adobe acrobat reader 8.1.1

adobe acrobat reader 8.1.2

adobe acrobat reader 9.1

adobe acrobat reader 9.1.1

adobe acrobat reader 8.1.4

adobe acrobat reader 8.1.3

adobe acrobat reader 9.1.2

adobe acrobat reader 9.1.3

Vendor Advisories

Synopsis Critical: acroread security and bug fix update Type/Severity Security Advisory: Critical Topic Updated acroread packages that fix two security issues and a bug are nowavailable for Red Hat Enterprise Linux 4 Extras and Red Hat EnterpriseLinux 5 SupplementaryThis update has been rated as having cri ...

Exploits

## # $Id: adobe_libtiffrb 10477 2010-09-25 11:59:02Z mc $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/core' require 'zl ...
## # $Id: mobilemail_libtiffrb 15950 2012-10-09 18:31:08Z rapid7 $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # web site for more information on licensing and terms of use # metasploitcom/ ## require 'msf/core' class Metasploit3 & ...
## # $Id: safari_libtiffrb 15950 2012-10-09 18:31:08Z rapid7 $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # web site for more information on licensing and terms of use # metasploitcom/ ## require 'msf/core' class Metasploit3 < ...
__doc__=''' Title: Adobe PDF LibTiff Integer Overflow Code Execution Product: Adobe Acrobat Reader Version: <=830, <=930 CVE: 2010-0188 Author: villy (villys777 at gmailcom) Site: bugix-securityblogspotcom/ Tested : succesfully tested on Adobe Reader 91/92/93 OS Windows XP(SP2,SP3) ------------------------------------------ ...

Github Repositories

Challenge Malware Analysis From Cyberdefender

GetPDF_Cyberdefender Repositori ini sengaja saya tulis untuk mendokumentasikan bagaimana saya dalam menganalisa suatu insiden mengenai malware Insiden tersebut berupa challenge yang dibuat oleh "The Honeynet Project" dalam platform cyberdefenders Challenge tersebut berjudul "GetPDF" yang dapat diakses pada link berikut : cyberdefendersorg/blueteam

PPDF> bytes 0 100 %PDF-11 1 0 obj <</Type /Catalog /Pages 2 0 R endobj 2 0 obj <</Type /Pages /Kids [ 3 0 R ] /C Usage: changelog [version] Show the changelog of the document or version of the document PPDF> changelog Changes in version 1: Producer: Acrobat Web Capture 80 Modification date: 2009-03-05T21:46:22+08:00 Added objects:

Recent Articles

Investigation Report for the September 2014 Equation malware detection incident in the US
Securelist • Kaspersky Lab • 16 Nov 2017

In early October, a story was published by the Wall Street Journal alleging Kaspersky Lab software was used to siphon classified data from an NSA employee’s home computer system. Given that Kaspersky Lab has been at the forefront of fighting cyberespionage and cybercriminal activities on the Internet for over 20 years now, these allegations were treated very seriously. To assist any independent investigators and all the people who have been asking us questions whether those allegations were tr...

Kaspersky Security Bulletin. Spam in 2014
Securelist • Maria Vergelis Tatyana Shcherbakova Nadezhda Demidova • 12 Mar 2015

According to Kaspersky Lab, in 2014 The popularity of mobile devices continues to grow, and this is affecting spam in email traffic: the number of advertising services that will spread spam on mobile devices is increasing, as are the number of offers addressed to the spammers who profit from these mailings. The popularity of mobile devices also makes them a valid vector for cyber-attack: email traffic now includes malicious imitations of emails sent from smartphones as well as fake notifications...

Spam and phishing in Q2 2014
Securelist • Darya Gudkova Nadezhda Demidova • 12 Aug 2014

PDF Version On 1 July, new anti-spam legislation (CASL) came into effect in Canada. The new law covers commercial communications including email, messages on social networks and instant messaging services as well as SMS. Now, before a company starts sending emails, it must get the recipients’ consent. Canadian companies appear to have taken the new law seriously: in the second quarter, we saw a lot emails from Canadian companies asking users for permission to send their mailings. As well as as...

Spam in May 2014
Securelist • Tatyana Shcherbakova Maria Vergelis • 30 Jun 2014

In the run-up to the summer, spammers offered their potential customers seedlings and seeds for gardening. In addition, English-language festive spam in May was dedicated to Mother’s Day – the attackers sent out adverts offering flowers and candies. As usual, the spammers were very busy in the run-up to the Mother’s Day celebration in May, sending out adverts for flowers and candies ahead of the holiday. To get the attention of the recipient, the subject of the email contained the name of ...

Poison PDF pusher released to public
The Register • Darren Pauli • 12 Jun 2014

A quick download, a couple of clicks, a naughty URL and you're in the business of crime

Attacking enterprises just got easier with the development of an idiot-friendly tool that spits out booby-trapped PDFs with a few clicks. The tool weaves existing exploits into PDFs, allowing attacks against Adobe Reader and Acrobat versions 8.x prior to 8.2.1 and 9.x before 9.3.1. Users can insert their own URL pointers into the program, which then spits out an exploited PDF. Microsoft's free anti-virus had blocked the attack (CVE-2010-0188) in a test and it was likely other platforms would rai...

Reminder: be careful opening invoices on the 21st March
Securelist • Ben Godwood • 15 Mar 2013

On March 4th we spotted a large number of unusual emails being blocked by our Linux Mail Security product. The emails all contained the same PDF attachment (MD5: 97b720519aefa00da58026f03d818251) but were being sent from many different source addresses. The emails were written in German and most were sent from German IP addresses. Below is a map showing the distribution of addresses: The computer names referenced in the mail headers were often of the form Andreas-PC or Kerstin-Laptop (the names ...

A Targeted Attack Against The Syrian Ministry of Foreign Affairs
Securelist • GReAT • 30 Nov 2012

Several days ago, a number of leaked documents from the Syrian Ministry of Foreign Affairs were published on Par:AnoIA, a new wikileaks-style site managed by the Anonymous collective. One of our users notified us of a suspicious document in the archive which is detected by our anti-malware products as Exploit.JS.Pdfka.ffw. He was also kind enough to send us a copy of the e-mail for analysis. Weve checked the e-mail, which contains a PDF file with an exploit (CVE-2010-0188, see http://cve.mitre.o...

Carberp: it’s not over yet
Securelist • Vyacheslav Zakorzhevsky • 26 Mar 2012

On 20 March, Russian law enforcement agencies announced the arrest of a cybercriminal gang involved in stealing money using the Carberp Trojan. This is very good news, but unfortunately does not mark the end of the Carberp story. Evidently, those arrested were just one of the criminal gangs using the Trojan. At the same time, those who actually developed Carberp are still at large, openly selling the Trojan on cybercriminal forums. Here is a recent offer for the ‘multifunctional bankbot’, wh...

New Exploit Targeting Java Vulnerability Found in BlackHole Arsenal
Securelist • Vyacheslav Zakorzhevsky • 13 Dec 2011

On 3 December, we noted a rapid growth in the number of detections for exploits targeting the vulnerability CVE-2011-3544 in Java virtual machine. The vulnerability was published on 18 October, but malicious users have only recently begun to make active use of it. It can be used by exploits in drive-by attacks to download and launch malicious programs. Number of unique detections of Exploit.Java.CVE-2011-3544 According to KSN data, most of the exploits targeting CVE-2011-3544 are used in the Bla...

Monthly Malware Statistics July 2010
Securelist • Vyacheslav Zakorzhevsky • 02 Aug 2010

The first Top Twenty list below shows malware, adware and potentially unwanted programs that were detected and neutralized by the on-access scanner when they were accessed for the first time. The first half of this list remained unchanged from last month, with viruses such as Sality and Virut and the infamous Kido worm all maintaining their positions. The second half, however, threw up a few surprises with six new entries. Let’s look at each of them in turn. Worm.Win32.Autoit.xl, in twelfth pl...

Zbot and CVE2010-0188
Securelist • Vyacheslav Zakorzhevsky • 28 Jul 2010

I just came across a suspicious PDF file, so I decided to take a deeper look. Once the file was unpacked, I got an xml file with TIFF image. However, the whole thing looked very strange. The whole thing looked very fishy, and ultimately, it turned out that the xml file contained an exploit for CVE-2010-0188. I thought it was a bit odd that we hadn’t come across files like this before, so I decided to tak a look at stats for this vulnerability: CVE-2010-0188 exploit statistics 2010 The graph sh...

Adobe yet again
Securelist • Eugene Aseev • 15 Mar 2010

Vulnerabilities continue to be detected and successfully exploited in Adobe’s most popular products – Acrobat and Reader. Some days ago we received an interesting PDF file (detected as Exploit.JS.Pdfka.bui) which contained an exploit for the CVE-2010-0188 vulnerability, which was originally discovered back in February in Acrobat/Reader version 9.3 and earlier. The first thing that catches the eye is the intentionally malformed TIFF image inside the PDF file. The vulnerability – a buffer ov...