9.3
CVSSv2

CVE-2010-3654

Published: 29/10/2010 Updated: 19/09/2017
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 940
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Adobe Flash Player prior to 9.0.289.0 and 10.x prior to 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris and 10.1.95.1 on Android, and authplay.dll (aka AuthPlayLib.bundle or libauthplay.so.0.0.0) in Adobe Reader and Acrobat 9.x up to and including 9.4, allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption and application crash) via crafted SWF content, as exploited in the wild in October 2010.

Vulnerable Product Search on Vulmon Subscribe to Product

adobe flash_player 10.1.82.76

adobe flash_player

adobe flash_player 10.0.45.2

adobe flash_player 10.0.32.18

adobe flash_player 9.0.125.0

adobe flash_player 9.0.152.0

adobe flash_player 9.0.151.0

adobe flash_player 9.0.115.0

adobe flash_player 9.0.20.0

adobe flash_player 9.0.159.0

adobe flash_player 8.0.33.0

adobe flash_player 7.0.25

adobe flash_player 7.0.63

adobe flash_player 7.0.1

adobe flash_player 6.0.21.0

macromedia flash_player 6.0.40.0

macromedia flash_player 6.0.29.0

adobe flash_player 10.1.52.15

adobe flash_player 10.1.52.14.1

adobe flash_player 10.0.12.10

adobe flash_player 10.0.22.87

adobe flash_player 9.125.0

adobe flash_player 9.0.18d60

adobe flash_player 9.0.31.0

adobe flash_player 9.0.31

adobe flash_player 8.0.22.0

adobe flash_player 8.0.42.0

adobe flash_player 7.0.69.0

adobe flash_player 7.0.70.0

adobe flash_player 6.0.79

macromedia flash_player 5.0_r50

macromedia flash_player 6.0

adobe flash_player 10.0.12.36

adobe flash_player 10.0.15.3

adobe flash_player 9.0.112.0

adobe flash_player 9.0.28.0

adobe flash_player 9.0.16

adobe flash_player 9.0.45.0

adobe flash_player 9.0.124.0

adobe flash_player 9.0.48.0

adobe flash_player 8.0.24.0

adobe flash_player 8.0.34.0

adobe flash_player 7.1.1

adobe flash_player 7.1

macromedia flash_player 5.0

macromedia flash_player 6.0.79.0

adobe flash_player 10.1.53.64

adobe flash_player 10.0.42.34

adobe flash_player 10.0.0.584

adobe flash_player 9.0.260.0

adobe flash_player 9.0.246.0

adobe flash_player 9.0.28

adobe flash_player 9.0.20

adobe flash_player 9.0.47.0

adobe flash_player 9.0.114.0

adobe flash_player 8.0

adobe flash_player 8.0.35.0

adobe flash_player 8.0.39.0

adobe flash_player 7.0

adobe flash_player 7.2

macromedia flash_player 6.0.65.0

macromedia flash_player 6.0.47.0

adobe flash_player 10.1.85.3

adobe flash_player 10.1.92.8

adobe flash_player 10.1.92.10

adobe acrobat 9.0

adobe acrobat 9.1

adobe acrobat 9.3.2

adobe acrobat 9.3.3

adobe acrobat reader 9.1.3

adobe acrobat reader 9.2

adobe acrobat 9.1.1

adobe acrobat 9.1.2

adobe acrobat 9.3.4

adobe acrobat 9.4

adobe acrobat reader 9.3

adobe acrobat reader 9.3.1

adobe acrobat 9.3

adobe acrobat 9.3.1

adobe acrobat reader 9.1.1

adobe acrobat reader 9.1.2

adobe acrobat reader 9.4

adobe acrobat 9.1.3

adobe acrobat 9.2

adobe acrobat reader 9.0

adobe acrobat reader 9.1

adobe acrobat reader 9.3.2

adobe acrobat reader 9.3.3

adobe acrobat reader 9.3.4

Exploits

This Metasploit module exploits a vulnerability in the handling of certain SWF movies within versions 9x and 100 of Adobe Flash Player Adobe Reader and Acrobat are also vulnerable, as are any other applications that may embed Flash player Arbitrary code execution is achieved by embedding a specially crafted Flash movie into a PDF document An A ...
Source: wwwabyssseccom/blog/2011/04/exploiting-adobe-flash-player-on-windows-7/ Adobe Flash player Action script type confusion exploit (DEP+ASLR bypass) advisory text : Here is another reliable windows 7 exploit the main method used for exploitation is based on Haifei-li presentation at CanSecWest but as exploit code not relased a ...
## # $Id: adobe_flashplayer_buttonrb 10857 2010-11-01 22:34:13Z jduck $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/cor ...

Recent Articles

Investigation Report for the September 2014 Equation malware detection incident in the US
Securelist • Kaspersky Lab • 16 Nov 2017

In early October, a story was published by the Wall Street Journal alleging Kaspersky Lab software was used to siphon classified data from an NSA employee’s home computer system. Given that Kaspersky Lab has been at the forefront of fighting cyberespionage and cybercriminal activities on the Internet for over 20 years now, these allegations were treated very seriously. To assist any independent investigators and all the people who have been asking us questions whether those allegations were tr...

Sykipot exploits an Adobe Flash Zero-Day
Securelist • Tillman Werner • 29 Oct 2010

Yesterday, Adobe published an advisory about a critical vulnerability in their Flash Player that is already being actively exploited. The CVE number assigned to this bug is CVE-2010-3654. A fix is currently being prepared by Adobe. The exploit we are seeing right now has a payload which, while not being very sophisticated, holds several surprises. When executed, the bot checks for command line options. The ‘-installkys’ option installs the bot onto the victim machine. Interestingly enough, i...

References

CWE-119http://contagiodump.blogspot.com/2010/10/potential-new-adobe-flash-player-zero.htmlhttp://secunia.com/advisories/41917http://www.securityfocus.com/bid/44504http://www.adobe.com/support/security/advisories/apsa10-05.htmlhttp://www.kb.cert.org/vuls/id/298081http://www.adobe.com/support/security/bulletins/apsb10-26.htmlhttp://support.apple.com/kb/HT4435http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.htmlhttp://www.vupen.com/english/advisories/2010/2906http://www.securitytracker.com/id?1024659http://www.redhat.com/support/errata/RHSA-2010-0834.htmlhttp://secunia.com/advisories/42030http://www.vupen.com/english/advisories/2010/2903http://www.redhat.com/support/errata/RHSA-2010-0829.htmlhttp://www.securitytracker.com/id?1024660http://secunia.com/advisories/42183http://www.vupen.com/english/advisories/2010/2918http://www.redhat.com/support/errata/RHSA-2010-0867.htmlhttp://www.adobe.com/support/security/bulletins/apsb10-28.htmlhttp://www.redhat.com/support/errata/RHSA-2010-0934.htmlhttp://www.vupen.com/english/advisories/2010/3111http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00001.htmlhttp://secunia.com/advisories/42401http://blogs.sun.com/security/entry/multiple_vulnerabilities_in_adobe_flash1http://secunia.com/advisories/42926http://security.gentoo.org/glsa/glsa-201101-09.xmlhttp://security.gentoo.org/glsa/glsa-201101-08.xmlhttp://www.vupen.com/english/advisories/2011/0173http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00002.htmlhttp://secunia.com/advisories/43026http://www.vupen.com/english/advisories/2011/0192http://www.vupen.com/english/advisories/2011/0191http://secunia.com/advisories/43025http://www.vupen.com/english/advisories/2011/0344http://www.turbolinux.co.jp/security/2011/TLSA-2011-2j.txthttp://securityreason.com/securityalert/8210https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13294https://nvd.nist.govhttps://packetstormsecurity.com/files/95444/Adobe-Flash-Player-Button-Remote-Code-Execution.htmlhttps://www.exploit-db.com/exploits/17187/https://www.kb.cert.org/vuls/id/298081