CVE-2013-0641
Severity CVSS v4.0:
Pending analysis
Type:
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Publication date:
14/02/2013
Last modified:
22/10/2025
Description
Buffer overflow in Adobe Reader and Acrobat 9.x before 9.5.4, 10.x before 10.1.6, and 11.x before 11.0.02 allows remote attackers to execute arbitrary code via a crafted PDF document, as exploited in the wild in February 2013.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Base Score 2.0
9.30
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:* | 9.0 (including) | 9.5.4 (excluding) |
| cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:* | 10.0 (including) | 10.1.6 (excluding) |
| cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:* | 11.0 (including) | 11.0.02 (excluding) |
| cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:* | 10.0 (including) | 10.1.6 (excluding) |
| cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:* | 11.0 (including) | 11.0.02 (excluding) |
| cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* | ||
| cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:* | 9.0 (including) | 9.5.4 (excluding) |
| cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://blog.fireeye.com/research/2013/02/in-turn-its-pdf-time.html
- http://blogs.adobe.com/psirt/2013/02/adobe-reader-and-acrobat-vulnerability-report.html
- http://blogs.mcafee.com/mcafee-labs/digging-into-the-sandbox-escape-technique-of-the-recent-pdf-exploit
- http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00021.html
- http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00023.html
- http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00024.html
- http://rhn.redhat.com/errata/RHSA-2013-0551.html
- http://security.gentoo.org/glsa/glsa-201308-03.xml
- http://www.adobe.com/support/security/advisories/apsa13-02.html
- http://www.adobe.com/support/security/bulletins/apsb13-07.html
- http://www.kb.cert.org/vuls/id/422807
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16296
- http://blog.fireeye.com/research/2013/02/in-turn-its-pdf-time.html
- http://blogs.adobe.com/psirt/2013/02/adobe-reader-and-acrobat-vulnerability-report.html
- http://blogs.mcafee.com/mcafee-labs/digging-into-the-sandbox-escape-technique-of-the-recent-pdf-exploit
- http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00021.html
- http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00023.html
- http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00024.html
- http://rhn.redhat.com/errata/RHSA-2013-0551.html
- http://security.gentoo.org/glsa/glsa-201308-03.xml
- http://www.adobe.com/support/security/advisories/apsa13-02.html
- http://www.adobe.com/support/security/bulletins/apsb13-07.html
- http://www.kb.cert.org/vuls/id/422807
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16296
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2013-0641



