CVE-2010-3644
Description
Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3640, CVE-2010-3641, CVE-2010-3642, CVE-2010-3643, CVE-2010-3645, CVE-2010-3646, CVE-2010-3647, CVE-2010-3648, CVE-2010-3649, CVE-2010-3650, and CVE-2010-3652.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 (and 10.1.95.1 on Android) is vulnerable to memory corruption that can lead to arbitrary code execution or denial of service via unknown vectors.
Vulnerability
This is an unspecified memory corruption vulnerability in Adobe Flash Player. Affected versions are Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, as well as 10.1.95.1 on Android. The official description lists this CVE alongside multiple related vulnerabilities (CVE-2010-3640 through CVE-2010-3652) and states the issue is triggered via unknown vectors [1][2][3][4].
Exploitation
The exploitation mechanism is not publicly detailed; the vulnerability is triggered via unknown vectors. The attacker's required position or conditions are not disclosed in the available references. Based on typical Flash Player attack patterns, exploitation likely requires the victim to visit a malicious site or open a crafted SWF file [1][2][3][4].
Impact
Successful exploitation could allow an attacker to execute arbitrary code on the affected system or cause a denial of service (memory corruption). The impact is at the privilege level of the user running Flash Player; no privilege escalation is described. This vulnerability is part of a group of similar issues patched in the same advisory, collectively allowing code execution or DoS [1][2][3][4].
Mitigation
Adobe released fixed versions: 9.0.289.0 for the 9.x line and 10.1.102.64 for the 10.x line on desktop platforms, and 10.1.95.1 for Android. These updates were made available in November 2010. Red Hat issued security updates for the flash-plugin package (RHSA-2010:0829, RHSA-2010:0834, RHSA-2010:0867) to address this and related vulnerabilities. Users should update to the latest Flash Player version or apply vendor-supplied patches [1][2][3][4].
AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
21- www.adobe.com/support/security/bulletins/apsb10-26.htmlnvdPatchVendor Advisory
- lists.apple.com/archives/security-announce/2010//Nov/msg00000.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2010-11/msg00002.htmlnvdThird Party Advisory
- marc.infonvdMailing ListThird Party Advisory
- secunia.com/advisories/42183nvdThird Party Advisory
- secunia.com/advisories/42926nvdThird Party Advisory
- secunia.com/advisories/43026nvdThird Party Advisory
- security.gentoo.org/glsa/glsa-201101-09.xmlnvdThird Party Advisory
- support.apple.com/kb/HT4435nvdThird Party Advisory
- www.redhat.com/support/errata/RHSA-2010-0829.htmlnvdThird Party Advisory
- www.redhat.com/support/errata/RHSA-2010-0834.htmlnvdThird Party Advisory
- www.redhat.com/support/errata/RHSA-2010-0867.htmlnvdThird Party Advisory
- www.securityfocus.com/bid/44680nvdThird Party AdvisoryVDB Entry
- www.vupen.com/english/advisories/2010/2903nvdThird Party Advisory
- www.vupen.com/english/advisories/2010/2906nvdThird Party Advisory
- www.vupen.com/english/advisories/2010/2918nvdThird Party Advisory
- www.vupen.com/english/advisories/2011/0173nvdThird Party Advisory
- www.vupen.com/english/advisories/2011/0192nvdThird Party Advisory
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11660nvdThird Party Advisory
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16220nvdThird Party Advisory
- blogs.sun.com/security/entry/multiple_vulnerabilities_in_adobe_flash1nvdBroken Link
News mentions
0No linked articles in our index yet.