CVE-2013-0640

Adobe Reader and Acrobat 9.x before 9.5.4, 10.x before 10.1.6, and 11.x before 11.0.02 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted PDF document, as exploited in the wild in February 2013.
References
Link Resource
http://blog.fireeye.com/research/2013/02/in-turn-its-pdf-time.html Broken Link
http://blogs.adobe.com/psirt/2013/02/adobe-reader-and-acrobat-vulnerability-report.html Broken Link
http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00021.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00023.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00024.html Mailing List Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2013-0551.html Third Party Advisory
http://security.gentoo.org/glsa/glsa-201308-03.xml Third Party Advisory
http://www.adobe.com/support/security/advisories/apsa13-02.html Vendor Advisory
http://www.adobe.com/support/security/bulletins/apsb13-07.html Broken Link
http://www.kb.cert.org/vuls/id/422807 Third Party Advisory US Government Resource
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16406 Broken Link
http://blog.fireeye.com/research/2013/02/in-turn-its-pdf-time.html Broken Link
http://blogs.adobe.com/psirt/2013/02/adobe-reader-and-acrobat-vulnerability-report.html Broken Link
http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00021.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00023.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00024.html Mailing List Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2013-0551.html Third Party Advisory
http://security.gentoo.org/glsa/glsa-201308-03.xml Third Party Advisory
http://www.adobe.com/support/security/advisories/apsa13-02.html Vendor Advisory
http://www.adobe.com/support/security/bulletins/apsb13-07.html Broken Link
http://www.kb.cert.org/vuls/id/422807 Third Party Advisory US Government Resource
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16406 Broken Link
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*
OR cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:-:*:*:*
cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*
OR cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

21 Nov 2024, 01:47

Type Values Removed Values Added
References () http://blog.fireeye.com/research/2013/02/in-turn-its-pdf-time.html - Broken Link () http://blog.fireeye.com/research/2013/02/in-turn-its-pdf-time.html - Broken Link
References () http://blogs.adobe.com/psirt/2013/02/adobe-reader-and-acrobat-vulnerability-report.html - Broken Link () http://blogs.adobe.com/psirt/2013/02/adobe-reader-and-acrobat-vulnerability-report.html - Broken Link
References () http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00021.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00021.html - Mailing List, Third Party Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00023.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00023.html - Mailing List, Third Party Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00024.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00024.html - Mailing List, Third Party Advisory
References () http://rhn.redhat.com/errata/RHSA-2013-0551.html - Third Party Advisory () http://rhn.redhat.com/errata/RHSA-2013-0551.html - Third Party Advisory
References () http://security.gentoo.org/glsa/glsa-201308-03.xml - Third Party Advisory () http://security.gentoo.org/glsa/glsa-201308-03.xml - Third Party Advisory
References () http://www.adobe.com/support/security/advisories/apsa13-02.html - Vendor Advisory () http://www.adobe.com/support/security/advisories/apsa13-02.html - Vendor Advisory
References () http://www.adobe.com/support/security/bulletins/apsb13-07.html - Broken Link () http://www.adobe.com/support/security/bulletins/apsb13-07.html - Broken Link
References () http://www.kb.cert.org/vuls/id/422807 - Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/422807 - Third Party Advisory, US Government Resource
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16406 - Broken Link () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16406 - Broken Link

16 Jul 2024, 17:36

Type Values Removed Values Added
CPE cpe:2.3:a:adobe:acrobat:9.3.1:-:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:10.1.3:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.3.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.3:-:pro:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.3:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.4.1:-:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.4.6:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.4.6:-:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:10.1.4:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:10.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:10.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:10.0.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:10.0.3:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.4.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.1.3:-:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:10.0.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:10.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:10.1.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:10.1.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.1:-:pro:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.3.4:-:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:10.0.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.5.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.5:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.3.2:-:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:10.1.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.4.2:-:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.5.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:11.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.4.3:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.3.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.3.3:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:10.1.3:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:10.0:-:pro:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:10.1.5:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.1.1:-:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.4.6:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.4.5:-:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.4.3:-:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.5:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.4.7:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.4.7:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.4.4:-:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:10.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.3:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.4:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.4.5:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:10.1.5:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.4.4:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:11.0.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:10.0.1:-:pro:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.5.3:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.5.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.5.3:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:11.0.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.4:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.3.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.1.3:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.4.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.0:-:pro:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.4.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.4.5:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.3.4:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.4.4:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.1.3:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:10.0.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.3.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.2:-:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:10.0.3:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.5.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:10.1.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.4.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.4.3:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.3.3:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.3.4:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:10.1.4:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:11.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:-:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*
CVSS v2 : 9.3
v3 : unknown
v2 : 9.3
v3 : 7.8
CWE NVD-CWE-noinfo CWE-787
First Time Redhat
Apple mac Os X
Redhat enterprise Linux Workstation
Microsoft
Redhat enterprise Linux Server
Apple
Opensuse opensuse
Redhat enterprise Linux Server Aus
Microsoft windows
Opensuse
Redhat enterprise Linux Eus
Redhat enterprise Linux Desktop
Linux
Linux linux Kernel
Suse
Suse linux Enterprise Desktop
References () http://blog.fireeye.com/research/2013/02/in-turn-its-pdf-time.html - () http://blog.fireeye.com/research/2013/02/in-turn-its-pdf-time.html - Broken Link
References () http://blogs.adobe.com/psirt/2013/02/adobe-reader-and-acrobat-vulnerability-report.html - () http://blogs.adobe.com/psirt/2013/02/adobe-reader-and-acrobat-vulnerability-report.html - Broken Link
References () http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00021.html - () http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00021.html - Mailing List, Third Party Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00023.html - () http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00023.html - Mailing List, Third Party Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00024.html - () http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00024.html - Mailing List, Third Party Advisory
References () http://rhn.redhat.com/errata/RHSA-2013-0551.html - () http://rhn.redhat.com/errata/RHSA-2013-0551.html - Third Party Advisory
References () http://security.gentoo.org/glsa/glsa-201308-03.xml - () http://security.gentoo.org/glsa/glsa-201308-03.xml - Third Party Advisory
References () http://www.adobe.com/support/security/advisories/apsa13-02.html - () http://www.adobe.com/support/security/advisories/apsa13-02.html - Vendor Advisory
References () http://www.adobe.com/support/security/bulletins/apsb13-07.html - () http://www.adobe.com/support/security/bulletins/apsb13-07.html - Broken Link
References () http://www.kb.cert.org/vuls/id/422807 - US Government Resource () http://www.kb.cert.org/vuls/id/422807 - Third Party Advisory, US Government Resource
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16406 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16406 - Broken Link

Information

Published : 2013-02-14 01:55

Updated : 2025-04-11 00:51


NVD link : CVE-2013-0640

Mitre link : CVE-2013-0640

CVE.ORG link : CVE-2013-0640


JSON object : View

Products Affected

redhat

  • enterprise_linux_workstation
  • enterprise_linux_desktop
  • enterprise_linux_server_aus
  • enterprise_linux_eus
  • enterprise_linux_server

adobe

  • acrobat_reader
  • acrobat

suse

  • linux_enterprise_desktop

opensuse

  • opensuse

linux

  • linux_kernel

microsoft

  • windows

apple

  • mac_os_x
CWE
CWE-787

Out-of-bounds Write