Clicky

Pages

Sunday, October 24, 2010

Oct 24 CVE-2010-2883 PDF Vision Poll Center from ynnchang@gmail.com

CVE-2010-2883 Stack-based buffer overflow in CoolType.dll in Adobe Reader and Acrobat 9.3.4 and earlier allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a PDF document with a long field in a Smart INdependent Glyphlets (SING) table in a TTF font, as exploited in the wild in September 2010. NOTE: some of these details are obtained from third party information



Download 20101024S01AL01PR1R.pdf as a password protected archive (contact me if you need the password)


From: 遠見民調中心 張雅琳 [mailto:ynnchang@gmail.com]
Sent: Sunday, October 24, 2010 11:51 PM
To: ynnchang@gmail.com
Subject: 遠見民調中心_台灣民心指數調查結果

    遠見民調中心 設計與執行
    台灣民心指數( Taiwan Public Mood Index, TPMI )
    2010年10月調查結果
         --------------------------------------------------------
                 遠見民調中心  張雅琳
           Global Views Survey Research Center
              104 台北市松江路93巷1號
               行動:0916-828-482
               電話:02-2517-3688分機638
               專線:02-2517-8537
               傳真:02-2517-6275

Chinese to English translation

From: Vision polling centers Zhang Yalin [mailto: ynnchang@gmail.com]Sent: Sunday, October 24, 2010 11:51 PMTo: ynnchang@gmail.comSubject: Vision polling center _ the findings of the Taiwan people index

    
Survey Center design and implementation of the vision
    
Taiwan Public Mood Index (Taiwan Public Mood Index, TPMI)
    
October 2010 survey results
         
-------------------------------------------------- ------
                 
Vision polls Center Zhang Yalin
           
Global Views Survey Research Center
              
Lane 93, Sung Chiang Road, Taipei 104, No. 1
               
Action :0916 -828-482
               
Tel :02 -2517-3688 ext 638
               
Line :02 -2517-8537
               
Fax :02 -2517-6275
 


File name:20101024S01AL01PR1R.pdf
http://www.virustotal.com/file-scan/report.html?id=0a45313368c6437fa419d034e0bdb6ca5eb6ca4359c607d90d1027ec7a6bfda8-1288175111
Submission date:2010-10-27 10:25:11 (UTC)
15/ 41 (36.6%)
AntiVir    7.10.13.47    2010.10.27    HTML/Malicious.PDF.Gen
Avast    4.8.1351.0    2010.10.27    PDF:CVE-2010-2883
Avast5    5.0.594.0    2010.10.27    PDF:CVE-2010-2883
AVG    9.0.0.851    2010.10.27    Exploit_c.KGX
BitDefender    7.2    2010.10.27    Exploit.PDF-TTF.Gen
Comodo    6526    2010.10.27    UnclassifiedMalware
DrWeb    5.0.2.03300    2010.10.27    Exploit.PDF.1641
F-Secure    9.0.16160.0    2010.10.27    Exploit.PDF-TTF.Gen
Fortinet    4.2.249.0    2010.10.27    PDF/CoolType!exploit.CVE20102883
GData    21    2010.10.27    Exploit.PDF-TTF.Gen
Ikarus    T3.1.1.90.0    2010.10.27    Exploit.Win32.CVE-2010-2883
Microsoft    1.6301    2010.10.27    Exploit:Win32/CVE-2010-2883.A
PCTools    7.0.3.5    2010.10.27    HeurEngine.MaliciousExploit
Sophos    4.58.0    2010.10.27    Troj/PDFJs-NA
Symantec    20101.2.0.161    2010.10.27    Bloodhound.Exploit.357
Additional information
Show all
MD5   : 1618d09ff580014b251794222bb0f0f9

No comments:

Post a Comment