CVE-2010-2883
HIGH KEVAdobe Reader/Acrobat <9.4-8.2.5 - Buffer Overflow
Title source: llmDescription
Stack-based buffer overflow in CoolType.dll in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a PDF document with a long field in a Smart INdependent Glyphlets (SING) table in a TTF font, as exploited in the wild in September 2010. NOTE: some of these details are obtained from third party information.
Exploits (6)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubylocalwindows
https://www.exploit-db.com/exploits/16619
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotewindows
https://www.exploit-db.com/exploits/16494
metasploit
WORKING POC
GREAT
by Unknown, sn0wfl0w, jduck · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/browser/adobe_cooltype_sing.rb
metasploit
WORKING POC
GREAT
by Unknown, sn0wfl0w, jduck · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/fileformat/adobe_cooltype_sing.rb
References (20)
Scores
CVSS v3
7.3
EPSS
0.9319
EPSS Percentile
99.8%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Details
CISA KEV
2022-06-08
VulnCheck KEV
2010-09-09
InTheWild.io
2018-10-30
ENISA EUVD
EUVD-2010-2887
CWE
CWE-787
Status
published
Products (2)
adobe/acrobat
8.0 - 8.2.5
adobe/acrobat_reader
8.0 - 8.2.5
Published
Sep 09, 2010
KEV Added
Jun 08, 2022
Tracked Since
Feb 18, 2026