CVE-2010-2883 Stack-based buffer overflow in CoolType.dll in Adobe Reader and
Acrobat 9.3.4 and earlier allows remote attackers to execute arbitrary
code or cause a denial of service (application crash) via a PDF
document with a long field in a Smart INdependent Glyphlets (SING)
table in a TTF font, as exploited in the wild in September 2010.
NOTE: some of these details are obtained from third party information
Download 20101024S01AL01PR1R.pdf as a password protected archive (contact me if you need the password)
From: 遠見民調中心 張雅琳 [mailto:ynnchang@gmail.com]
Sent: Sunday, October 24, 2010 11:51 PM
To: ynnchang@gmail.com
Subject: 遠見民調中心_台灣民心指數調查結果
遠見民調中心 設計與執行
台灣民心指數( Taiwan Public Mood Index, TPMI )
2010年10月調查結果
--------------------------------------------------------
遠見民調中心 張雅琳
Global Views Survey Research Center
104 台北市松江路93巷1號
行動:0916-828-482
電話:02-2517-3688分機638
專線:02-2517-8537
傳真:02-2517-6275
Chinese to English translation
From: Vision polling centers Zhang Yalin [mailto: ynnchang@gmail.com]Sent: Sunday, October 24, 2010 11:51 PMTo: ynnchang@gmail.comSubject: Vision polling center _ the findings of the Taiwan people index
Survey Center design and implementation of the vision
Taiwan Public Mood Index (Taiwan Public Mood Index, TPMI)
October 2010 survey results
-------------------------------------------------- ------
Vision polls Center Zhang Yalin
Global Views Survey Research Center
Lane 93, Sung Chiang Road, Taipei 104, No. 1
Action :0916 -828-482
Tel :02 -2517-3688 ext 638
Line :02 -2517-8537
Fax :02 -2517-6275
Survey Center design and implementation of the vision
Taiwan Public Mood Index (Taiwan Public Mood Index, TPMI)
October 2010 survey results
-------------------------------------------------- ------
Vision polls Center Zhang Yalin
Global Views Survey Research Center
Lane 93, Sung Chiang Road, Taipei 104, No. 1
Action :0916 -828-482
Tel :02 -2517-3688 ext 638
Line :02 -2517-8537
Fax :02 -2517-6275
File name:20101024S01AL01PR1R.pdf
http://www.virustotal.com/file-scan/report.html?id=0a45313368c6437fa419d034e0bdb6ca5eb6ca4359c607d90d1027ec7a6bfda8-1288175111
Submission date:2010-10-27 10:25:11 (UTC)
15/ 41 (36.6%)
AntiVir 7.10.13.47 2010.10.27 HTML/Malicious.PDF.Gen
Avast 4.8.1351.0 2010.10.27 PDF:CVE-2010-2883
Avast5 5.0.594.0 2010.10.27 PDF:CVE-2010-2883
AVG 9.0.0.851 2010.10.27 Exploit_c.KGX
BitDefender 7.2 2010.10.27 Exploit.PDF-TTF.Gen
Comodo 6526 2010.10.27 UnclassifiedMalware
DrWeb 5.0.2.03300 2010.10.27 Exploit.PDF.1641
F-Secure 9.0.16160.0 2010.10.27 Exploit.PDF-TTF.Gen
Fortinet 4.2.249.0 2010.10.27 PDF/CoolType!exploit.CVE20102883
GData 21 2010.10.27 Exploit.PDF-TTF.Gen
Ikarus T3.1.1.90.0 2010.10.27 Exploit.Win32.CVE-2010-2883
Microsoft 1.6301 2010.10.27 Exploit:Win32/CVE-2010-2883.A
PCTools 7.0.3.5 2010.10.27 HeurEngine.MaliciousExploit
Sophos 4.58.0 2010.10.27 Troj/PDFJs-NA
Symantec 20101.2.0.161 2010.10.27 Bloodhound.Exploit.357
Additional information
Show all
MD5 : 1618d09ff580014b251794222bb0f0f9
No comments:
Post a Comment