CVE-2010-3976
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
19/10/2010
Last modified:
11/04/2025
Description
Untrusted search path vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse dwmapi.dll that is located in the same folder as a file that is processed by Flash Player.
Impact
Base Score 2.0
9.30
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:* | 9.0.277.0 (including) | |
| cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:* | ||
| cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:* | ||
| cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:* | ||
| cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:* | ||
| cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:* | ||
| cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://core.yehg.net/lab/pr0js/advisories/dll_hijacking/%5Bflash_player%5D_10.1.x_insecure_dll_hijacking_%28dwmapi.dll%29
- http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00002.html
- http://marc.info/?l=bugtraq&m=130331642631603&w=2
- http://marc.info/?l=bugtraq&m=130331642631603&w=2
- http://secunia.com/advisories/43026
- http://security.gentoo.org/glsa/glsa-201101-09.xml
- http://support.apple.com/kb/HT4435
- http://www.acrossecurity.com/aspr/ASPR-2010-11-05-1-PUB.txt
- http://www.adobe.com/support/security/bulletins/apsb10-26.html
- http://www.derkeiler.com/Mailing-Lists/securityfocus/bugtraq/2010-09/msg00070.html
- http://www.securityfocus.com/archive/1/514653/100/0/threaded
- http://www.securityfocus.com/bid/44671
- http://www.vupen.com/english/advisories/2010/2903
- http://www.vupen.com/english/advisories/2011/0192
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6926
- http://core.yehg.net/lab/pr0js/advisories/dll_hijacking/%5Bflash_player%5D_10.1.x_insecure_dll_hijacking_%28dwmapi.dll%29
- http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00002.html
- http://marc.info/?l=bugtraq&m=130331642631603&w=2
- http://marc.info/?l=bugtraq&m=130331642631603&w=2
- http://secunia.com/advisories/43026
- http://security.gentoo.org/glsa/glsa-201101-09.xml
- http://support.apple.com/kb/HT4435
- http://www.acrossecurity.com/aspr/ASPR-2010-11-05-1-PUB.txt
- http://www.adobe.com/support/security/bulletins/apsb10-26.html
- http://www.derkeiler.com/Mailing-Lists/securityfocus/bugtraq/2010-09/msg00070.html
- http://www.securityfocus.com/archive/1/514653/100/0/threaded
- http://www.securityfocus.com/bid/44671
- http://www.vupen.com/english/advisories/2010/2903
- http://www.vupen.com/english/advisories/2011/0192
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6926



