Executive Summary

Informations
Name CVE-2015-3053 First vendor Publication 2015-05-13
Vendor Cve Last vendor Modification 2017-01-05

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 10 Attack Range Network
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Use-after-free vulnerability in Adobe Reader and Acrobat 10.x before 10.1.14 and 11.x before 11.0.11 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-3054, CVE-2015-3055, CVE-2015-3059, and CVE-2015-3075.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3053

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-416 Use After Free

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 25
Application 25
Os 1
Os 1

Snort® IPS/IDS

Date Description
2015-07-13 Adobe Acrobat Reader setPageAction use after free attempt
RuleID : 34846 - Revision : 3 - Type : FILE-PDF
2015-07-13 Adobe Acrobat Reader setPageAction use after free attempt
RuleID : 34845 - Revision : 3 - Type : FILE-PDF

Nessus® Vulnerability Scanner

Date Description
2015-05-14 Name : The version of Adobe Acrobat on the remote Windows host is affected by multip...
File : adobe_acrobat_apsb15-10.nasl - Type : ACT_GATHER_INFO
2015-05-14 Name : The version of Adobe Reader on the remote Windows host is affected by multipl...
File : adobe_reader_apsb15-10.nasl - Type : ACT_GATHER_INFO
2015-05-14 Name : The version of Adobe Acrobat on the remote Windows host is affected by multip...
File : macosx_adobe_acrobat_apsb15-10.nasl - Type : ACT_GATHER_INFO
2015-05-14 Name : The version of Adobe Reader on the remote Windows host is affected by multipl...
File : macosx_adobe_reader_apsb15-10.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
BID http://www.securityfocus.com/bid/74602
CONFIRM https://helpx.adobe.com/security/products/reader/apsb15-10.html
MISC http://www.zerodayinitiative.com/advisories/ZDI-15-215
SECTRACK http://www.securitytracker.com/id/1032284

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
Date Informations
2020-05-23 00:44:59
  • Multiple Updates
2017-01-06 00:23:42
  • Multiple Updates
2017-01-03 09:23:16
  • Multiple Updates
2016-12-03 09:24:11
  • Multiple Updates
2016-04-27 02:18:32
  • Multiple Updates
2015-07-13 21:27:00
  • Multiple Updates
2015-05-21 00:28:47
  • Multiple Updates
2015-05-19 21:30:36
  • Multiple Updates
2015-05-15 13:29:07
  • Multiple Updates
2015-05-14 21:29:53
  • Multiple Updates
2015-05-13 17:26:41
  • First insertion