Integer overflow in Adobe Reader and Acrobat 9.x before 9.5.5, 10.x before 10.1.7, and 11.x before 11.0.03 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2013-2727.
References
Link | Resource |
---|---|
http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00004.html | Mailing List Third Party Advisory |
http://rhn.redhat.com/errata/RHSA-2013-0826.html | Third Party Advisory |
http://security.gentoo.org/glsa/glsa-201308-03.xml | Third Party Advisory |
http://www.adobe.com/support/security/bulletins/apsb13-15.html | Not Applicable Patch Vendor Advisory |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16717 | Broken Link |
http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00004.html | Mailing List Third Party Advisory |
http://rhn.redhat.com/errata/RHSA-2013-0826.html | Third Party Advisory |
http://security.gentoo.org/glsa/glsa-201308-03.xml | Third Party Advisory |
http://www.adobe.com/support/security/bulletins/apsb13-15.html | Not Applicable Patch Vendor Advisory |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16717 | Broken Link |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
21 Nov 2024, 01:52
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00004.html - Mailing List, Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2013-0826.html - Third Party Advisory | |
References | () http://security.gentoo.org/glsa/glsa-201308-03.xml - Third Party Advisory | |
References | () http://www.adobe.com/support/security/bulletins/apsb13-15.html - Not Applicable, Patch, Vendor Advisory | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16717 - Broken Link |
09 Jul 2024, 18:22
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-190 | |
CVSS |
v2 : v3 : |
v2 : 10.0
v3 : 9.8 |
References | () http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00004.html - Mailing List, Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2013-0826.html - Third Party Advisory | |
References | () http://security.gentoo.org/glsa/glsa-201308-03.xml - Third Party Advisory | |
References | () http://www.adobe.com/support/security/bulletins/apsb13-15.html - Not Applicable, Patch, Vendor Advisory | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16717 - Broken Link | |
CPE | cpe:2.3:a:adobe:acrobat_reader:9.4.7:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.5.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:11.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.2:-:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.4.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.4.1:-:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:10.0.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.4.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:11.0.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.4.4:-:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:10.1.4:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:10.1.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.4.7:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:10.1.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:10.0:-:pro:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.4.6:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:11.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:10.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.5.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.4.5:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.4.5:-:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:11.0.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.1.1:-:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.3.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:10.0.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:10.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.3.1:-:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.3.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.4.6:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.0:-:pro:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.5.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:10.1.6:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:10.1.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:11.0.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:10.0.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.5.4:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.3.4:-:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:10.0.1:-:pro:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.3.2:-:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.5.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.5:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.1:-:pro:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.4.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:10.1.4:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.4.6:-:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:10.1.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.4.2:-:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.4:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:10.0.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.5.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.3.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:10.1.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.4.3:-:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:10.1.5:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.3:-:pro:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.1.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:10.0.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:10.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:10.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.4:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.1.3:-:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:10.1.6:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.3.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:10.0.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.4.5:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:10.1.5:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.4.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:10.1.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.4.4:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.1.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:11.0.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.5.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.4.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.3.4:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.4.4:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.5.4:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.3.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.3.2:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.4.1:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:9.3:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:9.5:*:*:*:*:*:*:* |
cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:* cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:-:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:* |
First Time |
Suse linux Enterprise Desktop
Redhat enterprise Linux Workstation Suse Redhat Redhat enterprise Linux Eus Redhat enterprise Linux Desktop Redhat enterprise Linux Server Redhat enterprise Linux Server Aus |
Information
Published : 2013-05-16 11:45
Updated : 2024-11-21 01:52
NVD link : CVE-2013-2729
Mitre link : CVE-2013-2729
CVE.ORG link : CVE-2013-2729
JSON object : View
Products Affected
redhat
- enterprise_linux_server
- enterprise_linux_desktop
- enterprise_linux_server_aus
- enterprise_linux_eus
- enterprise_linux_workstation
adobe
- acrobat
- acrobat_reader
suse
- linux_enterprise_desktop
CWE
CWE-190
Integer Overflow or Wraparound