Lucene search

K
cve[email protected]CVE-2011-2100
HistoryJun 16, 2011 - 11:55 p.m.

CVE-2011-2100

2011-06-1623:55:01
web.nvd.nist.gov
37
cve-2011-2100
adobe reader
acrobat
untrusted search path
vulnerability
windows
local users
privileges
dll

6.9 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

6.4 Medium

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

21.3%

Untrusted search path vulnerability in Adobe Reader and Acrobat 8.x before 8.3, 9.x before 9.4.5, and 10.x before 10.1 on Windows allows local users to gain privileges via a Trojan horse DLL in the current working directory.

Affected configurations

NVD
Node
adobeacrobat_readerMatch8.0
OR
adobeacrobat_readerMatch8.1
OR
adobeacrobat_readerMatch8.1.1
OR
adobeacrobat_readerMatch8.1.2
OR
adobeacrobat_readerMatch8.1.3
OR
adobeacrobat_readerMatch8.1.4
OR
adobeacrobat_readerMatch8.1.5
OR
adobeacrobat_readerMatch8.1.6
OR
adobeacrobat_readerMatch8.1.7
OR
adobeacrobat_readerMatch8.2
OR
adobeacrobat_readerMatch8.2.1
OR
adobeacrobat_readerMatch8.2.2
OR
adobeacrobat_readerMatch8.2.3
OR
adobeacrobat_readerMatch8.2.4
OR
adobeacrobat_readerMatch8.2.6
OR
adobeacrobat_readerMatch9.0
OR
adobeacrobat_readerMatch9.1
OR
adobeacrobat_readerMatch9.1.1
OR
adobeacrobat_readerMatch9.1.2
OR
adobeacrobat_readerMatch9.1.3
OR
adobeacrobat_readerMatch9.2
OR
adobeacrobat_readerMatch9.3
OR
adobeacrobat_readerMatch9.3.1
OR
adobeacrobat_readerMatch9.3.2
OR
adobeacrobat_readerMatch9.3.3
OR
adobeacrobat_readerMatch9.3.4
OR
adobeacrobat_readerMatch9.4
OR
adobeacrobat_readerMatch9.4.1
OR
adobeacrobat_readerMatch9.4.2
OR
adobeacrobat_readerMatch9.4.3
OR
adobeacrobat_readerMatch9.4.4
OR
adobeacrobat_readerMatch10.0
OR
adobeacrobat_readerMatch10.0.1
OR
adobeacrobat_readerMatch10.0.2
OR
adobeacrobat_readerMatch10.0.3
AND
microsoftwindows
Node
adobeacrobatMatch8.0
OR
adobeacrobatMatch8.1
OR
adobeacrobatMatch8.1.1
OR
adobeacrobatMatch8.1.2
OR
adobeacrobatMatch8.1.3
OR
adobeacrobatMatch8.1.4
OR
adobeacrobatMatch8.1.5
OR
adobeacrobatMatch8.1.6
OR
adobeacrobatMatch8.1.7
OR
adobeacrobatMatch8.2
OR
adobeacrobatMatch8.2.1
OR
adobeacrobatMatch8.2.2
OR
adobeacrobatMatch8.2.3
OR
adobeacrobatMatch8.2.4
OR
adobeacrobatMatch8.2.5
OR
adobeacrobatMatch8.2.6
OR
adobeacrobatMatch9.0
OR
adobeacrobatMatch9.1
OR
adobeacrobatMatch9.1.1
OR
adobeacrobatMatch9.1.2
OR
adobeacrobatMatch9.1.3
OR
adobeacrobatMatch9.2
OR
adobeacrobatMatch9.3
OR
adobeacrobatMatch9.3.1
OR
adobeacrobatMatch9.3.2
OR
adobeacrobatMatch9.3.3
OR
adobeacrobatMatch9.3.4
OR
adobeacrobatMatch9.4
OR
adobeacrobatMatch9.4.1
OR
adobeacrobatMatch9.4.2
OR
adobeacrobatMatch9.4.3
OR
adobeacrobatMatch9.4.4
OR
adobeacrobatMatch10.0
OR
adobeacrobatMatch10.0.1
OR
adobeacrobatMatch10.0.2
OR
adobeacrobatMatch10.0.3
AND
microsoftwindows

6.9 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

6.4 Medium

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

21.3%