CVE-2013-0640

Adobe Reader and Acrobat 9.x before 9.5.4, 10.x before 10.1.6, and 11.x before 11.0.02 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted PDF document, as exploited in the wild in February 2013.
References
Link Resource
http://blog.fireeye.com/research/2013/02/in-turn-its-pdf-time.html Broken Link
http://blogs.adobe.com/psirt/2013/02/adobe-reader-and-acrobat-vulnerability-report.html Broken Link
http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00021.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00023.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00024.html Mailing List Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2013-0551.html Third Party Advisory
http://security.gentoo.org/glsa/glsa-201308-03.xml Third Party Advisory
http://www.adobe.com/support/security/advisories/apsa13-02.html Vendor Advisory
http://www.adobe.com/support/security/bulletins/apsb13-07.html Broken Link
http://www.kb.cert.org/vuls/id/422807 Third Party Advisory US Government Resource
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16406 Broken Link
http://blog.fireeye.com/research/2013/02/in-turn-its-pdf-time.html Broken Link
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16406 Broken Link
http://www.kb.cert.org/vuls/id/422807 Third Party Advisory US Government Resource
http://www.adobe.com/support/security/bulletins/apsb13-07.html Broken Link
http://www.adobe.com/support/security/advisories/apsa13-02.html Vendor Advisory
http://security.gentoo.org/glsa/glsa-201308-03.xml Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2013-0551.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00024.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00023.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00021.html Mailing List Third Party Advisory
http://blogs.adobe.com/psirt/2013/02/adobe-reader-and-acrobat-vulnerability-report.html Broken Link
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*
OR cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:-:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*
OR cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

20 Dec 2024, 14:26

Type Values Removed Values Added
References (REDHAT) http://rhn.redhat.com/errata/RHSA-2013-0551.html - Third Party Advisory () http://rhn.redhat.com/errata/RHSA-2013-0551.html - Third Party Advisory
References (MISC) http://blog.fireeye.com/research/2013/02/in-turn-its-pdf-time.html - Broken Link () http://blog.fireeye.com/research/2013/02/in-turn-its-pdf-time.html - Broken Link
References (CONFIRM) http://blogs.adobe.com/psirt/2013/02/adobe-reader-and-acrobat-vulnerability-report.html - Broken Link () http://blogs.adobe.com/psirt/2013/02/adobe-reader-and-acrobat-vulnerability-report.html - Broken Link
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00021.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00021.html - Mailing List, Third Party Advisory
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00024.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00024.html - Mailing List, Third Party Advisory
References (CONFIRM) http://www.adobe.com/support/security/bulletins/apsb13-07.html - Broken Link () http://www.adobe.com/support/security/bulletins/apsb13-07.html - Broken Link
References (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16406 - Broken Link () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16406 - Broken Link
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00023.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00023.html - Mailing List, Third Party Advisory
References (GENTOO) http://security.gentoo.org/glsa/glsa-201308-03.xml - Third Party Advisory () http://security.gentoo.org/glsa/glsa-201308-03.xml - Third Party Advisory
References (CERT-VN) http://www.kb.cert.org/vuls/id/422807 - Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/422807 - Third Party Advisory, US Government Resource
References (CONFIRM) http://www.adobe.com/support/security/advisories/apsa13-02.html - Vendor Advisory () http://www.adobe.com/support/security/advisories/apsa13-02.html - Vendor Advisory

16 Jul 2024, 17:36

Type Values Removed Values Added
CPE cpe:2.3:a:adobe:acrobat:9.0:-:pro:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.3.3:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.5.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.1.3:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.4.5:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.1.1:-:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:10.1.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.4.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.5:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.5.3:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:10.0.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:10.0.3:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.3.4:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.1:-:pro:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.3:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.4.3:-:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.5.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.5.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.4.4:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.5.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:10.1.3:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:10.1.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.4.6:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.5:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.4.6:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.4.3:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.3.4:-:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.3.1:-:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:10.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:10.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:10.0.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:10.0.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.4.7:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.3.3:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:10.1.3:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:10.1.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:11.0.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:10.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:10.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.4.5:-:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:11.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.3:-:pro:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.3.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.4.6:-:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:10.0:-:pro:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.4.4:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.3.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.4.3:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.3.2:-:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.4.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.3.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.4:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.4.7:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.4.1:-:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:10.0.3:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:10.0.1:-:pro:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:11.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:10.1.5:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:10.1.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.2:-:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.4.5:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:10.1.4:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.4.2:-:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:10.1.4:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:11.0.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:10.0.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.1.3:-:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.3:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.4.4:-:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.5.3:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:10.1.5:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.4:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.4.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.3.4:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.3.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.4.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.1.3:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:-:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
CWE NVD-CWE-noinfo CWE-787
CVSS v2 : 9.3
v3 : unknown
v2 : 9.3
v3 : 7.8
First Time Apple
Opensuse
Microsoft windows
Redhat enterprise Linux Server
Suse
Redhat
Redhat enterprise Linux Desktop
Opensuse opensuse
Suse linux Enterprise Desktop
Linux linux Kernel
Redhat enterprise Linux Server Aus
Redhat enterprise Linux Workstation
Apple mac Os X
Linux
Redhat enterprise Linux Eus
Microsoft
References (CONFIRM) http://www.adobe.com/support/security/bulletins/apsb13-07.html - (CONFIRM) http://www.adobe.com/support/security/bulletins/apsb13-07.html - Broken Link
References (CONFIRM) http://blogs.adobe.com/psirt/2013/02/adobe-reader-and-acrobat-vulnerability-report.html - (CONFIRM) http://blogs.adobe.com/psirt/2013/02/adobe-reader-and-acrobat-vulnerability-report.html - Broken Link
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00021.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00021.html - Mailing List, Third Party Advisory
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00024.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00024.html - Mailing List, Third Party Advisory
References (CERT-VN) http://www.kb.cert.org/vuls/id/422807 - US Government Resource (CERT-VN) http://www.kb.cert.org/vuls/id/422807 - Third Party Advisory, US Government Resource
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00023.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00023.html - Mailing List, Third Party Advisory
References (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16406 - (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16406 - Broken Link
References (CONFIRM) http://www.adobe.com/support/security/advisories/apsa13-02.html - (CONFIRM) http://www.adobe.com/support/security/advisories/apsa13-02.html - Vendor Advisory
References (MISC) http://blog.fireeye.com/research/2013/02/in-turn-its-pdf-time.html - (MISC) http://blog.fireeye.com/research/2013/02/in-turn-its-pdf-time.html - Broken Link
References (GENTOO) http://security.gentoo.org/glsa/glsa-201308-03.xml - (GENTOO) http://security.gentoo.org/glsa/glsa-201308-03.xml - Third Party Advisory
References (REDHAT) http://rhn.redhat.com/errata/RHSA-2013-0551.html - (REDHAT) http://rhn.redhat.com/errata/RHSA-2013-0551.html - Third Party Advisory

Information

Published : 2013-02-14 01:55

Updated : 2025-02-13 17:50


NVD link : CVE-2013-0640

Mitre link : CVE-2013-0640


JSON object : View

Products Affected

adobe

  • acrobat
  • acrobat_reader

redhat

  • enterprise_linux_desktop
  • enterprise_linux_eus
  • enterprise_linux_server
  • enterprise_linux_server_aus
  • enterprise_linux_workstation

apple

  • mac_os_x

opensuse

  • opensuse

suse

  • linux_enterprise_desktop

microsoft

  • windows

linux

  • linux_kernel
CWE
CWE-787

Out-of-bounds Write