CVE-2010-1240
Adobe PDF - Embedded EXE Social Engineering
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
5Exploited in Wild
-Decision
Descriptions
Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, do not restrict the contents of one text field in the Launch File warning dialog, which makes it easier for remote attackers to trick users into executing an arbitrary local program that was specified in a PDF document, as demonstrated by a text field that claims that the Open button will enable the user to read an encrypted message.
Reader y Acrobat de Adobe versiones 9.x anteriores a 9.3.3, y versiones 8.x anteriores a 8.2.3, sobre Windows y Mac OS X, no restringen el contenido de un campo de texto en el cuadro de diálogo de advertencia Iniciar Archivo, lo que facilita a los atacantes remotos engañar a los usuarios para que ejecuten un programa local arbitrario que se especificó en un documento PDF, como es demostrado por un campo de texto que afirma que el botón Abrir permitirá al usuario leer un mensaje cifrado.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2010-03-31 First Exploit
- 2010-04-05 CVE Reserved
- 2010-04-05 CVE Published
- 2024-08-07 CVE Updated
- 2024-11-13 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-264: Permissions, Privileges, and Access Controls
CAPEC
References (14)
URL | Tag | Source |
---|---|---|
http://blog.didierstevens.com/2010/06/29/quickpost-no-escape-from-pdf | X_refsource_misc | |
http://lists.immunitysec.com/pipermail/dailydave/2010-April/006075.html | Mailing List | |
http://www.adobe.com/support/security/bulletins/apsb10-15.html | X_refsource_confirm | |
http://www.securitytracker.com/id?1024159 | Vdb Entry | |
http://www.us-cert.gov/cas/techalerts/TA10-231A.html | Third Party Advisory | |
http://www.vupen.com/english/advisories/2010/1636 | Vdb Entry | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7466 | Signature |
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/16671 | 2010-12-16 | |
https://www.exploit-db.com/exploits/16682 | 2010-12-16 | |
https://www.exploit-db.com/exploits/11987 | 2010-03-31 | |
https://github.com/asepsaepdin/CVE-2010-1240 | 2023-09-03 | |
http://blog.didierstevens.com/2010/03/29/escape-from-pdf | 2024-08-07 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://access.redhat.com/security/cve/CVE-2010-1240 | 2010-06-30 | |
https://bugzilla.redhat.com/show_bug.cgi?id=609203 | 2010-06-30 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Adobe Search vendor "Adobe" | Acrobat Reader Search vendor "Adobe" for product "Acrobat Reader" | 9.3.1 Search vendor "Adobe" for product "Acrobat Reader" and version "9.3.1" | - |
Affected
| in | Microsoft Search vendor "Microsoft" | Windows Search vendor "Microsoft" for product "Windows" | * | - |
Safe
|