Vulnerability Details : CVE-2013-0640
Adobe Reader and Acrobat 9.x before 9.5.4, 10.x before 10.1.6, and 11.x before 11.0.02 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted PDF document, as exploited in the wild in February 2013.
Vulnerability category: Memory CorruptionExecute codeDenial of service
CVE-2013-0640 is in the CISA Known Exploited Vulnerabilities Catalog
CISA vulnerability name:
Adobe Reader and Acrobat Memory Corruption Vulnerability
CISA required action:
Apply updates per vendor instructions.
CISA description:
An memory corruption vulnerability exists in the acroform.dll in Adobe Reader that allows an attacker to perform remote code execution.
Added on
2022-03-03
Action due date
2022-03-24
Exploit prediction scoring system (EPSS) score for CVE-2013-0640
Probability of exploitation activity in the next 30 days: 94.89%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 99 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2013-0640
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST |
References for CVE-2013-0640
-
http://www.adobe.com/support/security/bulletins/apsb13-07.html
Adobe - Security Bulletins: APSB13-07 - Security updates for Adobe Reader and Acrobat
-
http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00021.html
[security-announce] openSUSE-SU-2013:0335-1: critical: acroread to 9.5.4
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16406
Repository / Oval Repository
-
http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00024.html
[security-announce] SUSE-SU-2013:0349-1: important: Security update for
-
http://blogs.adobe.com/psirt/2013/02/adobe-reader-and-acrobat-vulnerability-report.html
Adobe Product Security Incident Response Team (PSIRT) Blog
-
http://rhn.redhat.com/errata/RHSA-2013-0551.html
RHSA-2013:0551 - Security Advisory - Red Hat Customer Portal
-
http://blog.fireeye.com/research/2013/02/in-turn-its-pdf-time.html
FireEye Blog - Threat Research and Analysis | FireEye
-
http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00023.html
[security-announce] openSUSE-SU-2013:0342-1: critical: acroread to 9.5.4
-
http://www.kb.cert.org/vuls/id/422807
VU#422807 - Adobe Reader and Acrobat memory corruption vulnerabilitiesUS Government Resource
-
http://security.gentoo.org/glsa/glsa-201308-03.xml
Adobe Reader: Multiple vulnerabilities (GLSA 201308-03) — Gentoo security
-
http://www.adobe.com/support/security/advisories/apsa13-02.html
Adobe - Security Advisories: APSA13-02 - Security Advisory for Adobe Reader and Acrobat
Products affected by CVE-2013-0640
- cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:9.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:9.3:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:9.2:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:9.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:9.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:9.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:9.3.4:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:9.4:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:10.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:9.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:9.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:10.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:9.4.3:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:10.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:10.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:10.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:9.4.4:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:9.4.6:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:9.4.5:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:10.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:9.5:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:9.4.7:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:9.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:10.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:10.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:9.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:10.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:11.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:9.5.3:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:10.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:11.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.2:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.3:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.3.4:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.4:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:10.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:10.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.4.3:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:10.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.4.4:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:10.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.4.5:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:10.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.4.6:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:10.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.4.7:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.1:-:pro:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.0:-:pro:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.5:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.3:-:pro:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:10.0:-:pro:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:10.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:10.0.1:-:pro:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:10.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.4.3:-:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.4.6:-:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.4.1:-:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.1.1:-:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.4.4:-:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.2:-:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.3.1:-:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.3.4:-:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.4.5:-:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.4.2:-:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.3.2:-:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.1.3:-:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:10.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:11.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.5.3:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:10.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:11.0.1:*:*:*:*:*:*:*