Show plain JSON{"id": "CVE-2010-4188", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 9.3, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "authentication": "NONE", "integrityImpact": "COMPLETE", "accessComplexity": "MEDIUM", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "acInsufInfo": false, "impactScore": 10.0, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}]}, "published": "2011-02-10T16:00:12.863", "references": [{"url": "http://dvlabs.tippingpoint.com/advisory/TPTI-11-01", "source": "psirt@adobe.com"}, {"url": "http://www.adobe.com/support/security/bulletins/apsb11-01.html", "tags": ["Patch", "Vendor Advisory"], "source": "psirt@adobe.com"}, {"url": "http://www.securityfocus.com/archive/1/516332/100/0/threaded", "source": "psirt@adobe.com"}, {"url": "http://www.securityfocus.com/bid/46319", "source": "psirt@adobe.com"}, {"url": "http://www.securitytracker.com/id?1025056", "source": "psirt@adobe.com"}, {"url": "http://www.vupen.com/english/advisories/2011/0335", "tags": ["Vendor Advisory"], "source": "psirt@adobe.com"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-119"}]}], "descriptions": [{"lang": "en", "value": "The dirapi.dll module in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a Director movie with an IFWV chunk with a size field of 0, which is used in the calculation of a file offset and causes invalid data to be used as a loop counter, triggering a heap-based buffer overflow, a different vulnerability than CVE-2010-2587 and CVE-2010-2588."}, {"lang": "es", "value": "El m\u00f3dulo dirapi.dll de Shockwave Player de Adobe anterior a versi\u00f3n 11.5.9.620, permite a los atacantes ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) por medio de una pel\u00edcula Director con un fragmento IFWV con un campo de tama\u00f1o 0, que es usado en el c\u00e1lculo de un desplazamiento de archivo y causa que los datos no v\u00e1lidos sean usados como un contador de bucle, desencadenando un desbordamiento de b\u00fafer en la regi\u00f3n heap de la memoria, una vulnerabilidad diferente de CVE-2010-2587 y CVE-2010-2588."}], "lastModified": "2018-10-10T20:07:28.973", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1601F8CE-9D13-473A-AABA-C76C96C87679", "versionEndIncluding": "11.5.9.615"}, {"criteria": "cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BA5643BC-12F8-4F05-A363-9FC97EF1DD0F"}, {"criteria": "cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "085FA7DD-8048-4768-816C-82828022FCF3"}, {"criteria": "cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E0DC258D-1C2B-4A7F-AD80-6C88A7A78A5D"}, {"criteria": "cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "966A8542-E5E1-468F-989E-47F71123A426"}, {"criteria": "cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4DC1BCC0-B24B-4CFC-B3B9-FA3B0D968CC1"}, {"criteria": "cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BFFDAAB3-CC22-4604-80B3-4A54CCEFD29E"}, {"criteria": "cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A77F1733-6755-44E7-8ECC-CFB397FC79A1"}, {"criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9282EC1A-DFDB-49A9-8BE1-013D9B494D99"}, {"criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C4A8422D-39E4-490C-B3EC-FED7468D6B4D"}, {"criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "88A75AF4-F7BA-4CA4-8079-5D9794E1BD45"}, {"criteria": "cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "712325E1-B37A-4994-B42E-F02553A3CB9C"}, {"criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AC55CB2C-4DBC-4D16-96A7-FB3316A21D51"}, {"criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FADB5808-5F9A-4FBD-A6FC-3DB17A6C6CF8"}, {"criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BFC415B5-F7C8-4277-A4A3-ECFA2CB38515"}, {"criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3454FF46-3D72-4FF9-AF5B-2E948DA412D7"}, {"criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E4726504-850B-4434-A149-09000D21F917"}, {"criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C6D89450-C92C-4541-917B-AD047803A2AC"}, {"criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "798EB26B-14D6-4E90-AC84-FF47B89B82E7"}, {"criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CA562619-7FAA-4FA6-AE42-55801AF00D9C"}, {"criteria": "cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BA961FB2-C543-4A1C-9C9E-C56641EB13FB"}, {"criteria": "cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "17F5982F-35BD-49A0-9DBE-774816136D57"}, {"criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "56D23F59-4939-4ABE-A5BC-283BFC362E45"}, {"criteria": "cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DE1DB962-10C6-4536-B693-4AF59F0C4D94"}, {"criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FA60B4FB-2BA4-4304-A7B8-8F0676C4F022"}, {"criteria": "cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F7D6B993-1CF8-4944-8456-B99A72F24814"}, {"criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D18289BB-6568-4671-BC70-C8744DD2E0C6"}, {"criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AD29AACC-E101-494B-BFD4-D97FDBE4A584"}, {"criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3F52120E-9CAB-40D9-A577-5D8278139F50"}, {"criteria": "cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AAB05A7D-3017-4589-AE5C-B1A377AF02B7"}, {"criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "58C665F7-E05D-4A8C-B217-6689C95D3FF8"}, {"criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8441B2BB-3837-4EDE-B44E-323B434CBF56"}, {"criteria": "cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2007F032-06BA-4347-9D9E-2C7C4C9BBCD0"}, {"criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BF19CBB1-F047-4472-A19D-48A147396383"}, {"criteria": "cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C51EB3CF-6770-4626-BDA7-9ED94A374911"}, {"criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C61B9485-2A42-4C95-9A10-3F1102E4EBBD"}, {"criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "79FEEF7E-B477-485A-B9BC-98F6D1A2B10B"}, {"criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E4FE4A01-9357-46D9-9BCB-DF2B4DECD9B3"}, {"criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4B9506D5-D8CA-4845-B2FA-0E47C9BB3C1A"}, {"criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9FBAFFFF-D658-45F0-AF14-BA29AA2D5394"}, {"criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7BFB28F3-ADA5-4BD1-9723-73FA291307BD"}, {"criteria": "cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9760A554-1D44-4249-97DE-8423A97BA9FB"}], "operator": "OR"}]}], "sourceIdentifier": "psirt@adobe.com"}