Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2010-4091Improper Restriction of Operations within the Bounds of a Memory Buffer in Adobe Acrobat

Severity
9.3CRITICALNVD
EPSS
41.0%
top 2.61%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedNov 7
Latest updateMay 14

Description

The EScript.api plugin in Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.1, and 8.x before 8.2.6 on Windows and Mac OS X allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted PDF document that triggers memory corruption, involving the printSeps function. NOTE: some of these details are obtained from third party information.

CVSS vector

AV:N/AC:M/C:C/I:C/A:CExploitability: 8.6 | Impact: 10.0

Affected Packages2 packages

NVDadobe/acrobat_reader26 versions+25
NVDadobe/acrobat27 versions+26

Patches

🔴Vulnerability Details

1
GHSA
GHSA-g5vr-3wpw-49ph: The EScript2022-05-14

💥Exploits & PoCs

1
Exploit-DB
Acrobat Reader 9.4 - Memory Corruption2010-11-04

🔍Detection Rules

1
Suricata
ET WEB_CLIENT Possible Adobe Reader 9.4 this.printSeps Memory Corruption Attempt2010-11-09

📋Vendor Advisories

1
Red Hat
acroread: remote DoS or possible arbitrary code execution via EScript.api plugin2010-11-04

📄Research Papers

2
arXiv
Machine Learning With Feature Selection Using Principal Component Analysis for Malware Detection: A Case Study2019-02-10
arXiv
MLPdf: An Effective Machine Learning Based Approach for PDF Malware Detection2018-08-21

💬Community

2
Bugzilla
CVE-2011-0562 CVE-2011-0563 CVE-2011-0565 CVE-2011-0566 CVE-2011-0567 CVE-2011-0585 CVE-2011-0586 CVE-2011-0589 CVE-2011-0590 CVE-2011-0591 CVE-2011-0592 CVE-2011-0593 CVE-2011-0594 CVE-2011-0595 acro2011-02-08
Bugzilla
CVE-2010-4091 acroread: remote DoS or possible arbitrary code execution via EScript.api plugin2010-11-08
CVE-2010-4091 — Adobe Acrobat vulnerability | cvebase