10
CVSSv2

CVE-2011-2462

Published: 07/12/2011 Updated: 19/09/2017
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 1000
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Unspecified vulnerability in the U3D component in Adobe Reader and Acrobat 10.1.1 and previous versions on Windows and Mac OS X, and Adobe Reader 9.x up to and including 9.4.6 on UNIX, allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, as exploited in the wild in December 2011.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

adobe acrobat_reader 10.0.1

adobe acrobat_reader 10.0

adobe acrobat_reader 9.1.3

adobe acrobat_reader 9.0

adobe acrobat_reader 9.3.0

adobe acrobat_reader 9.3.2

adobe acrobat_reader 8.1

adobe acrobat_reader 8.1.7

adobe acrobat_reader 7.0.7

adobe acrobat_reader 7.1.0

adobe acrobat_reader 7.0.1

adobe acrobat_reader 7.0

adobe acrobat_reader 5.1

adobe acrobat_reader 5.0.9

adobe acrobat_reader 5.0.7

adobe acrobat_reader 4.5

adobe acrobat_reader 4.0

adobe acrobat_reader 9.1.2

adobe acrobat_reader 9.2

adobe acrobat_reader 9

adobe acrobat_reader 9.3

adobe acrobat_reader 9.3.4

adobe acrobat_reader 8.1.4

adobe acrobat_reader 8.2.3

adobe acrobat_reader 8.1.2

adobe acrobat_reader 8.2.1

adobe acrobat_reader 7.0.8

adobe acrobat_reader 7.0.9

adobe acrobat_reader 6.0.5

adobe acrobat_reader 6.0.4

adobe acrobat_reader 5.0.6

adobe acrobat_reader 5.0.5

adobe acrobat_reader 4.0.5c

adobe acrobat_reader 4.0.5a

adobe acrobat_reader 10.0.3

adobe acrobat_reader 10.0.2

adobe acrobat_reader 9.4.2

adobe acrobat_reader 9.1.1

adobe acrobat_reader 9.4

adobe acrobat_reader 9.3.3

adobe acrobat_reader 8.2

adobe acrobat_reader 8.1.6

adobe acrobat_reader 8.2.2

adobe acrobat_reader 7.0.6

adobe acrobat_reader 7.0.4

adobe acrobat_reader 7.0.5

adobe acrobat_reader 6.0.1

adobe acrobat_reader 6.0

adobe acrobat_reader 5.0

adobe acrobat_reader 4.0.5

adobe acrobat_reader 3.02

adobe acrobat_reader

adobe acrobat_reader 10.1

adobe acrobat_reader 9.4.1

adobe acrobat_reader 9.4.4

adobe acrobat_reader 9.4.3

adobe acrobat_reader 9.3.1

adobe acrobat_reader 9.1

adobe acrobat_reader 8.0

adobe acrobat_reader 8.1.5

adobe acrobat_reader 8.1.1

adobe acrobat_reader 8.2.4

adobe acrobat_reader 7.0.2

adobe acrobat_reader 7.0.3

adobe acrobat_reader 6.0.3

adobe acrobat_reader 6.0.2

adobe acrobat_reader 5.0.11

adobe acrobat_reader 5.0.10

adobe acrobat_reader 3.0

adobe acrobat_reader 3.01

adobe acrobat

adobe acrobat 10.0.3

adobe acrobat 9.1

adobe acrobat 9.3.3

adobe acrobat 9.4

adobe acrobat 9.3.2

adobe acrobat 8.2.3

adobe acrobat 8.1.4

adobe acrobat 8.2.4

adobe acrobat 8.2.2

adobe acrobat 7.0.6

adobe acrobat 7.0.3

adobe acrobat 7.0

adobe acrobat 7.0.1

adobe acrobat 6.0.4

adobe acrobat 6.0.5

adobe acrobat 4.0.5c

adobe acrobat 3.0

adobe acrobat 9.4.2

adobe acrobat 9

adobe acrobat 9.3

adobe acrobat 9.3.4

adobe acrobat 9.1.3

adobe acrobat 8

adobe acrobat 8.1.1

adobe acrobat 8.1.5

adobe acrobat 8.1.6

adobe acrobat 7.0.8

adobe acrobat 7.0.5

adobe acrobat 7.1.3

adobe acrobat 7.1.1

adobe acrobat 6.0.2

adobe acrobat 6.0.3

adobe acrobat 4.0.5

adobe acrobat 4.0.5a

adobe acrobat 10.0.2

adobe acrobat 10.0.1

adobe acrobat 9.2

adobe acrobat 9.0

adobe acrobat 9.3.1

adobe acrobat 9.1.1

adobe acrobat 8.1.3

adobe acrobat 8.0

adobe acrobat 8.2.1

adobe acrobat 8.2

adobe acrobat 7.0.4

adobe acrobat 7.1.2

adobe acrobat 7.0.2

adobe acrobat 6.0.6

adobe acrobat 5.0

adobe acrobat 5.0.10

adobe acrobat 3.1

adobe acrobat 10.0

adobe acrobat 9.4.1

adobe acrobat 9.4.3

adobe acrobat 9.4.4

adobe acrobat 9.1.2

adobe acrobat 8.1

adobe acrobat 8.1.2

adobe acrobat 8.1.7

adobe acrobat 7

adobe acrobat 7.0.9

adobe acrobat 7.0.7

adobe acrobat 7.1.0

adobe acrobat 7.1.4

adobe acrobat 6.0

adobe acrobat 6.0.1

adobe acrobat 5.0.5

adobe acrobat 5.0.6

adobe acrobat 4.0

adobe acrobat_reader 9.4.6

adobe acrobat 9.4.5

adobe acrobat 9.4.6

adobe acrobat_reader 9.4.5

Vendor Advisories

Synopsis Critical: acroread security update Type/Severity Security Advisory: Critical Topic Updated acroread packages that fix two security issues are now availablefor Red Hat Enterprise Linux 4 Extras and Red Hat Enterprise Linux 5 and 6SupplementaryThe Red Hat Security Response Team has rated this update ...

Exploits

## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/core' require 'zlib' class Metasploit3 < Msf::Exploit::Remote Rank = Averag ...

Github Repositories

A Python 3 upgrade to Peepdf

peepdf-3 - peepdf for Python 3 peepdf-3 is a Python 3 tool to explore PDF files in order to find out if the file can be harmful or not The aim of this tool is to provide all the necessary components that a security researcher could need in a PDF analysis without using 3 or 4 tools to make all the tasks With peepdf it's possible to see all the objects in the document show

peepdf is a Python tool to explore PDF files in order to find out if the file can be harmful or not The aim of this tool is to provide all the necessary components that a security researcher could need in a PDF analysis without using 3 or 4 tools to make all the tasks With peepdf it's possible to see all the objects in the document showing the suspicious elements, suppor

Powerful Python tool to analyze PDF documents

peepdf is a Python tool to explore PDF files in order to find out if the file can be harmful or not The aim of this tool is to provide all the necessary components that a security researcher could need in a PDF analysis without using 3 or 4 tools to make all the tasks With peepdf it's possible to see all the objects in the document showing the suspicious elements, suppor

ExploitAnalysis Session #1 ** Analysing an exploit on CVE-2011-2462 **

Recent Articles

Security report becomes security risk
The Register • Phil Muncaster • 22 Feb 2013

Mandiant's report on Chinese hacking used as bait in spear phishing attacks

A high profile security report released earlier this week detailing Chinese military involvement in widespread online attacks is itself now being used as a lure in spear-phishing attacks, according to researchers. The report, APT1: Exposing One of China's Cyber Espionage Units, published by security firm Mandiant, made headlines across the globe as one of the first to detail a concrete link between the Communist Party and advanced persistent threat (APT) style attacks on a range of targets world...

Kaspersky Security Bulletin. Malware Evolution 2011
Securelist • Alexander Gostev Costin Raiu • 01 Mar 2012

With 2011 coming to its end, it makes sense to sit back and take a look at what’s been happening over the past 12 months in the IT Security world. If we had to summarize the year in a single word, I think it would have to be “explosive.” The multitude of incidents, stories, facts, new trends and intriguing actors is so big that it makes it very hard to come up with a Top-10 of security stories of 2011. What I was aiming for with this list was to remember the stories that also indicated maj...

Adobe kills two actively exploited bugs in Reader
The Register • Dan Goodin • 17 Dec 2011

Unscheduled update coming to Windows machine near you

Adobe has released updates for its Reader and Acrobat applications that fix two vulnerabilities that attackers were exploiting to seize control of Windows-based machines. Version 9.4.7 of the programs fix two memory-corruption bugs that Adobe says are “being actively exploited in limited, targeted attacks in the wild” against machines running Windows. The same bugs are present in Mac and Unix versions of the applications, but there are no reports of machines running them being exploited. The...