Enhanced Mitigation Experience Toolkit can block CVE-2010-2883 exploit

Published: 2010-09-13
Last Updated: 2010-09-13 14:11:27 UTC
by Manuel Humberto Santander Pelaez (Version: 2)
7 comment(s)

Handler Daniel wrote a story abot Enhanced Mitigation Experience Toolkit (EMET) in september 2. This tool can be used now to successfuly block Adobe Reader and Acrobat CVE-2010-2883 exploit. More information at http://blogs.technet.com/b/srd/archive/2010/09/10/use-emet-2-0-to-block-the-adobe-0-day-exploit.aspx

More details about EMET at http://technet.microsoft.com/en-us/security/ff859539.aspx 

-- Manuel Humberto Santander Peláez | http://twitter.com/manuelsantander | http://manuel.santander.name | msantand at isc dot sans dot org

7 comment(s)

Adobe SING table parsing exploit (CVE-2010-2883) in the wild

Published: 2010-09-13
Last Updated: 2010-09-13 14:08:12 UTC
by Manuel Humberto Santander Pelaez (Version: 1)
1 comment(s)

We have received reports that CVE-2010-2883 is being actively exploited.

There are a couple of interesting analysis done about this vulnerability. Read them at http://community.websense.com/blogs/securitylabs/archive/2010/09/10/brief-analysis-on-adobe-reader-sing-table-parsing-vulnerability-cve-2010-2883.aspx and http://www.attackvector.org/new-adobe-0day-demonstration.

Read the Adobe advisory here.

-- Manuel Humberto Santander Peláez | http://twitter.com/manuelsantander | http://manuel.santander.name | msantand at isc dot sans dot org

1 comment(s)

Comments

cwqwqwq
eweew<a href="https://www.seocheckin.com/edu-sites-list/">mashood</a>
WQwqwqwq[url=https://www.seocheckin.com/edu-sites-list/]mashood[/url]
dwqqqwqwq mashood
[https://isc.sans.edu/diary.html](https://isc.sans.edu/diary.html)
[https://isc.sans.edu/diary.html | https://isc.sans.edu/diary.html]
What's this all about ..?
password reveal .

Diary Archives