Vulnerability Details : CVE-2013-3346
Adobe Reader and Acrobat 9.x before 9.5.5, 10.x before 10.1.7, and 11.x before 11.0.03 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2718, CVE-2013-2719, CVE-2013-2720, CVE-2013-2721, CVE-2013-2722, CVE-2013-2723, CVE-2013-2725, CVE-2013-2726, CVE-2013-2731, CVE-2013-2732, CVE-2013-2734, CVE-2013-2735, CVE-2013-2736, CVE-2013-3337, CVE-2013-3338, CVE-2013-3339, CVE-2013-3340, and CVE-2013-3341.
Vulnerability category: OverflowMemory CorruptionExecute codeDenial of service
Public exploit exists!
CVE-2013-3346
is in the CISA Known Exploited Vulnerabilities Catalog
CISA vulnerability name:
Adobe Reader and Acrobat Memory Corruption Vulnerability
CISA required action:
Apply updates per vendor instructions.
CISA description:
Adobe Reader and Acrobat contain a memory corruption vulnerability which can allow attackers to execute arbitrary code or cause a denial of service.
Added on
2022-03-03
Action due date
2022-03-24
Exploit prediction scoring system (EPSS) score for CVE-2013-3346
Probability of exploitation activity in the next 30 days: 97.38%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 100 % EPSS Score History EPSS FAQ
Metasploit modules for CVE-2013-3346
-
Adobe Reader ToolButton Use After Free
Disclosure Date: 2013-08-08First seen: 2020-04-26exploit/windows/browser/adobe_toolbuttonThis module exploits an use after free condition on Adobe Reader versions 11.0.2, 10.1.6 and 9.5.4 and prior. The vulnerability exists while handling the ToolButton object, where the cEnable callback can be used to early free the object memory. Later use of the object -
Adobe Reader ToolButton Use After Free
Disclosure Date: 2013-08-08First seen: 2020-04-26exploit/windows/fileformat/adobe_toolbuttonThis module exploits a use after free condition on Adobe Reader versions 11.0.2, 10.1.6 and 9.5.4 and prior. The vulnerability exists while handling the ToolButton object, where the cEnable callback can be used to early free the object memory. Later use of the object
CVSS scores for CVE-2013-3346
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
nvd@nist.gov |
CWE ids for CVE-2013-3346
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2013-3346
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19054
Repository / Oval Repository
-
http://www.adobe.com/support/security/bulletins/apsb13-15.html
Adobe - Security Bulletins: APSB13-15 - Security updates for Adobe Reader and AcrobatVendor Advisory
Products affected by CVE-2013-3346
- cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:9.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:9.3:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:9.2:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:9.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:9.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:9.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:9.3.4:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:9.4:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:10.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:9.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:9.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:10.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:9.4.3:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:10.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:10.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:10.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:9.4.4:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:9.4.6:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:9.4.5:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:10.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:9.5:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:9.4.7:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:9.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:10.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:10.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:9.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:10.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:11.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:9.5.3:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:10.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:11.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:9.5.4:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:10.1.6:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:11.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:11.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.2:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.3:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.3.4:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.4:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:10.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:10.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.4.3:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:10.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.4.4:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:10.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.4.5:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:10.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.4.6:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:10.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.4.7:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.1:-:pro:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.0:-:pro:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.5:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.3:-:pro:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:10.0:-:pro:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:10.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:10.0.1:-:pro:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:10.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.4.3:-:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.4.6:-:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.4.1:-:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.1.1:-:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.4.4:-:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.2:-:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.3.1:-:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.3.4:-:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.4.5:-:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.4.2:-:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.3.2:-:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.1.3:-:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:10.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:11.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.5.3:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:10.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:11.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:9.5.4:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:10.1.6:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:11.0.2:*:*:*:*:*:*:*