CVE-2013-0640

Adobe Reader and Acrobat 9.x before 9.5.4, 10.x before 10.1.6, and 11.x before 11.0.02 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted PDF document, as exploited in the wild in February 2013.
References
Link Resource
http://blog.fireeye.com/research/2013/02/in-turn-its-pdf-time.html Broken Link
http://blogs.adobe.com/psirt/2013/02/adobe-reader-and-acrobat-vulnerability-report.html Broken Link
http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00021.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00023.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00024.html Mailing List Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2013-0551.html Third Party Advisory
http://security.gentoo.org/glsa/glsa-201308-03.xml Third Party Advisory
http://www.adobe.com/support/security/advisories/apsa13-02.html Vendor Advisory
http://www.adobe.com/support/security/bulletins/apsb13-07.html Broken Link
http://www.kb.cert.org/vuls/id/422807 Third Party Advisory US Government Resource
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16406 Broken Link
http://blog.fireeye.com/research/2013/02/in-turn-its-pdf-time.html Broken Link
http://blogs.adobe.com/psirt/2013/02/adobe-reader-and-acrobat-vulnerability-report.html Broken Link
http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00021.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00023.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00024.html Mailing List Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2013-0551.html Third Party Advisory
http://security.gentoo.org/glsa/glsa-201308-03.xml Third Party Advisory
http://www.adobe.com/support/security/advisories/apsa13-02.html Vendor Advisory
http://www.adobe.com/support/security/bulletins/apsb13-07.html Broken Link
http://www.kb.cert.org/vuls/id/422807 Third Party Advisory US Government Resource
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16406 Broken Link
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*
OR cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:-:*:*:*
cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*
OR cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

21 Nov 2024, 01:47

Type Values Removed Values Added
References () http://blog.fireeye.com/research/2013/02/in-turn-its-pdf-time.html - Broken Link () http://blog.fireeye.com/research/2013/02/in-turn-its-pdf-time.html - Broken Link
References () http://blogs.adobe.com/psirt/2013/02/adobe-reader-and-acrobat-vulnerability-report.html - Broken Link () http://blogs.adobe.com/psirt/2013/02/adobe-reader-and-acrobat-vulnerability-report.html - Broken Link
References () http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00021.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00021.html - Mailing List, Third Party Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00023.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00023.html - Mailing List, Third Party Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00024.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00024.html - Mailing List, Third Party Advisory
References () http://rhn.redhat.com/errata/RHSA-2013-0551.html - Third Party Advisory () http://rhn.redhat.com/errata/RHSA-2013-0551.html - Third Party Advisory
References () http://security.gentoo.org/glsa/glsa-201308-03.xml - Third Party Advisory () http://security.gentoo.org/glsa/glsa-201308-03.xml - Third Party Advisory
References () http://www.adobe.com/support/security/advisories/apsa13-02.html - Vendor Advisory () http://www.adobe.com/support/security/advisories/apsa13-02.html - Vendor Advisory
References () http://www.adobe.com/support/security/bulletins/apsb13-07.html - Broken Link () http://www.adobe.com/support/security/bulletins/apsb13-07.html - Broken Link
References () http://www.kb.cert.org/vuls/id/422807 - Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/422807 - Third Party Advisory, US Government Resource
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16406 - Broken Link () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16406 - Broken Link

16 Jul 2024, 17:36

Type Values Removed Values Added
CVSS v2 : 9.3
v3 : unknown
v2 : 9.3
v3 : 7.8
References () http://blog.fireeye.com/research/2013/02/in-turn-its-pdf-time.html - () http://blog.fireeye.com/research/2013/02/in-turn-its-pdf-time.html - Broken Link
References () http://blogs.adobe.com/psirt/2013/02/adobe-reader-and-acrobat-vulnerability-report.html - () http://blogs.adobe.com/psirt/2013/02/adobe-reader-and-acrobat-vulnerability-report.html - Broken Link
References () http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00021.html - () http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00021.html - Mailing List, Third Party Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00023.html - () http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00023.html - Mailing List, Third Party Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00024.html - () http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00024.html - Mailing List, Third Party Advisory
References () http://rhn.redhat.com/errata/RHSA-2013-0551.html - () http://rhn.redhat.com/errata/RHSA-2013-0551.html - Third Party Advisory
References () http://security.gentoo.org/glsa/glsa-201308-03.xml - () http://security.gentoo.org/glsa/glsa-201308-03.xml - Third Party Advisory
References () http://www.adobe.com/support/security/advisories/apsa13-02.html - () http://www.adobe.com/support/security/advisories/apsa13-02.html - Vendor Advisory
References () http://www.adobe.com/support/security/bulletins/apsb13-07.html - () http://www.adobe.com/support/security/bulletins/apsb13-07.html - Broken Link
References () http://www.kb.cert.org/vuls/id/422807 - US Government Resource () http://www.kb.cert.org/vuls/id/422807 - Third Party Advisory, US Government Resource
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16406 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16406 - Broken Link
First Time Linux
Suse linux Enterprise Desktop
Apple
Opensuse
Opensuse opensuse
Redhat enterprise Linux Desktop
Redhat enterprise Linux Workstation
Redhat
Microsoft windows
Microsoft
Linux linux Kernel
Apple mac Os X
Redhat enterprise Linux Server
Suse
Redhat enterprise Linux Server Aus
Redhat enterprise Linux Eus
CWE NVD-CWE-noinfo CWE-787
CPE cpe:2.3:a:adobe:acrobat:9.4:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.3.4:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.3.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:10.1.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.3:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:10.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.5:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:10.0.3:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.5.3:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:10.1.5:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.4.6:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.2:-:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:10.1.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.4.6:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:10.0.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.5.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.4.7:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.5.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:10.0.3:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.5.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.4.7:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:10.1.5:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.3.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.5.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.5.3:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.4.2:-:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:10.1.4:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.4.3:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:10.0.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:10.1.4:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.3.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:10.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.4.4:-:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.4.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.3.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.4.6:-:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.1.3:-:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:11.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.4.5:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.3:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.4.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.1.3:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.3.4:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.0:-:pro:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.4.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.3:-:pro:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:10.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.4:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:10.0:-:pro:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.1.3:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.3.2:-:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:10.0.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.4.5:-:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:11.0.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:10.0.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.4.5:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.4.1:-:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:10.1.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:10.0.1:-:pro:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.3.3:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.4.3:-:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.4.4:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.5:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:10.1.3:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.3.3:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.3.4:-:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.1.1:-:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.3.1:-:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:10.1.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.4.4:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.4.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:10.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.4.3:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:10.1.3:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.1:-:pro:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:11.0.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:11.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:-:*:*:*

Information

Published : 2013-02-14 01:55

Updated : 2024-12-20 14:26


NVD link : CVE-2013-0640

Mitre link : CVE-2013-0640

CVE.ORG link : CVE-2013-0640


JSON object : View

Products Affected

redhat

  • enterprise_linux_desktop
  • enterprise_linux_eus
  • enterprise_linux_workstation
  • enterprise_linux_server_aus
  • enterprise_linux_server

microsoft

  • windows

linux

  • linux_kernel

opensuse

  • opensuse

adobe

  • acrobat_reader
  • acrobat

apple

  • mac_os_x

suse

  • linux_enterprise_desktop
CWE
CWE-787

Out-of-bounds Write