← Back to CVEs
CVE-2013-0641
HIGHCISA KEV7.8
Description
Buffer overflow in Adobe Reader and Acrobat 9.x before 9.5.4, 10.x before 10.1.6, and 11.x before 11.0.02 allows remote attackers to execute arbitrary code via a crafted PDF document, as exploited in the wild in February 2013.
CVE Details
CVSS v3.1 Score7.8
SeverityHIGH
CVSS VectorCVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack VectorLOCAL
ComplexityLOW
Privileges RequiredNONE
User InteractionREQUIRED
Published2/14/2013
Last Modified4/21/2026
Sourcekev
Honeypot Sightings0
CISA KEV
VendorAdobe
ProductReader
Vulnerability NameAdobe Reader Buffer Overflow Vulnerability
KEV Date Added2022-03-03
Remediation Due Date2022-03-24
Ransomware UseUnknown
Affected Products
adobe:acrobatadobe:acrobat_readerapple:mac_os_xlinux:linux_kernelmicrosoft:windowsopensuse:opensuseredhat:enterprise_linux_desktopredhat:enterprise_linux_eusredhat:enterprise_linux_serverredhat:enterprise_linux_server_ausredhat:enterprise_linux_workstationsuse:linux_enterprise_desktop
Weaknesses (CWE)
CWE-120CWE-120
References
http://blog.fireeye.com/research/2013/02/in-turn-its-pdf-time.html(psirt@adobe.com)
http://blogs.adobe.com/psirt/2013/02/adobe-reader-and-acrobat-vulnerability-report.html(psirt@adobe.com)
http://blogs.mcafee.com/mcafee-labs/digging-into-the-sandbox-escape-technique-of-the-recent-pdf-exploit(psirt@adobe.com)
http://rhn.redhat.com/errata/RHSA-2013-0551.html(psirt@adobe.com)
http://security.gentoo.org/glsa/glsa-201308-03.xml(psirt@adobe.com)
http://www.adobe.com/support/security/advisories/apsa13-02.html(psirt@adobe.com)
http://www.adobe.com/support/security/bulletins/apsb13-07.html(psirt@adobe.com)
http://www.kb.cert.org/vuls/id/422807(psirt@adobe.com)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16296(psirt@adobe.com)
http://blog.fireeye.com/research/2013/02/in-turn-its-pdf-time.html(af854a3a-2127-422b-91ae-364da2661108)
http://blogs.adobe.com/psirt/2013/02/adobe-reader-and-acrobat-vulnerability-report.html(af854a3a-2127-422b-91ae-364da2661108)
http://blogs.mcafee.com/mcafee-labs/digging-into-the-sandbox-escape-technique-of-the-recent-pdf-exploit(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00021.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00023.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00024.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2013-0551.html(af854a3a-2127-422b-91ae-364da2661108)
http://security.gentoo.org/glsa/glsa-201308-03.xml(af854a3a-2127-422b-91ae-364da2661108)
http://www.adobe.com/support/security/advisories/apsa13-02.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.adobe.com/support/security/bulletins/apsb13-07.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.kb.cert.org/vuls/id/422807(af854a3a-2127-422b-91ae-364da2661108)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16296(af854a3a-2127-422b-91ae-364da2661108)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2013-0641(134c704f-9b21-4f2e-91b3-4a467353bcc0)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.