Adobe Reader and Acrobat 9.x before 9.5.4, 10.x before 10.1.6, and 11.x before 11.0.02 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted PDF document, as exploited in the wild in February 2013.
References
Configurations
Configuration 1 (hide)
| AND |
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
| AND |
|
History
22 Oct 2025, 01:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Oct 2025, 20:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Oct 2025, 19:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Nov 2024, 01:47
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://blog.fireeye.com/research/2013/02/in-turn-its-pdf-time.html - Broken Link | |
| References | () http://blogs.adobe.com/psirt/2013/02/adobe-reader-and-acrobat-vulnerability-report.html - Broken Link | |
| References | () http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00021.html - Mailing List, Third Party Advisory | |
| References | () http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00023.html - Mailing List, Third Party Advisory | |
| References | () http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00024.html - Mailing List, Third Party Advisory | |
| References | () http://rhn.redhat.com/errata/RHSA-2013-0551.html - Third Party Advisory | |
| References | () http://security.gentoo.org/glsa/glsa-201308-03.xml - Third Party Advisory | |
| References | () http://www.adobe.com/support/security/advisories/apsa13-02.html - Vendor Advisory | |
| References | () http://www.adobe.com/support/security/bulletins/apsb13-07.html - Broken Link | |
| References | () http://www.kb.cert.org/vuls/id/422807 - Third Party Advisory, US Government Resource | |
| References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16406 - Broken Link |
16 Jul 2024, 17:36
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-787 | |
| CPE | cpe:2.3:a:adobe:acrobat:9.4:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:10.1.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.4.6:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:10.0.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.3.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.3.2:-:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.3.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:10.0.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:11.0.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.4.1:-:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.4.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.2:-:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.4.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:10.1.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:10.1.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:10.1.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:10.0.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.4.6:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:10.0.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.3.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.5.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:10.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.4.3:-:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.5.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:10.1.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.3.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.3.4:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.4.6:-:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:10.0.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.4.4:-:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.4.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.5:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:10.1.4:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.3:-:pro:*:*:*:*:* cpe:2.3:a:adobe:acrobat:11.0.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.5:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.5.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.1.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.3.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:10.0.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.5.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:10.1.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.5.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:10.1.5:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.0:-:pro:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.1.1:-:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:11.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.4.5:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.5.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:10.0:-:pro:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.1.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.3.4:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:10.0.1:-:pro:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.4.5:-:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:11.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:10.1.4:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.4.4:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:10.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.4.7:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.4.5:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.1:-:pro:*:*:*:*:* cpe:2.3:a:adobe:acrobat:10.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.3.4:-:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.4.7:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:10.1.5:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.3.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.4:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.4.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.1.3:-:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.4.2:-:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.4.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.4.4:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:10.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.4.2:*:*:*:*:*:*:* |
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:* cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:* cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:-:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:* |
| References | () http://blog.fireeye.com/research/2013/02/in-turn-its-pdf-time.html - Broken Link | |
| References | () http://blogs.adobe.com/psirt/2013/02/adobe-reader-and-acrobat-vulnerability-report.html - Broken Link | |
| References | () http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00021.html - Mailing List, Third Party Advisory | |
| References | () http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00023.html - Mailing List, Third Party Advisory | |
| References | () http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00024.html - Mailing List, Third Party Advisory | |
| References | () http://rhn.redhat.com/errata/RHSA-2013-0551.html - Third Party Advisory | |
| References | () http://security.gentoo.org/glsa/glsa-201308-03.xml - Third Party Advisory | |
| References | () http://www.adobe.com/support/security/advisories/apsa13-02.html - Vendor Advisory | |
| References | () http://www.adobe.com/support/security/bulletins/apsb13-07.html - Broken Link | |
| References | () http://www.kb.cert.org/vuls/id/422807 - Third Party Advisory, US Government Resource | |
| References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16406 - Broken Link | |
| First Time |
Suse linux Enterprise Desktop
Redhat enterprise Linux Server Opensuse Linux Apple Redhat enterprise Linux Workstation Redhat enterprise Linux Server Aus Suse Opensuse opensuse Linux linux Kernel Redhat enterprise Linux Eus Microsoft Redhat Apple mac Os X Microsoft windows Redhat enterprise Linux Desktop |
|
| CVSS |
v2 : v3 : |
v2 : 9.3
v3 : 7.8 |
Information
Published : 2013-02-14 01:55
Updated : 2025-10-22 01:15
NVD link : CVE-2013-0640
Mitre link : CVE-2013-0640
CVE.ORG link : CVE-2013-0640
JSON object : View
Products Affected
adobe
- acrobat_reader
- acrobat
suse
- linux_enterprise_desktop
microsoft
- windows
redhat
- enterprise_linux_eus
- enterprise_linux_workstation
- enterprise_linux_desktop
- enterprise_linux_server_aus
- enterprise_linux_server
apple
- mac_os_x
linux
- linux_kernel
opensuse
- opensuse
CWE
CWE-787
Out-of-bounds Write
