Lucene search

K
cve[email protected]CVE-2013-3338
HistoryMay 16, 2013 - 11:45 a.m.

CVE-2013-3338

2013-05-1611:45:31
CWE-119
web.nvd.nist.gov
34
In Wild
cve-2013-3338
adobe
reader
acrobat
arbitrary code execution
denial of service
memory corruption
nvd

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

7.7 High

AI Score

Confidence

Low

0.292 Low

EPSS

Percentile

96.9%

Adobe Reader and Acrobat 9.x before 9.5.5, 10.x before 10.1.7, and 11.x before 11.0.03 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2718, CVE-2013-2719, CVE-2013-2720, CVE-2013-2721, CVE-2013-2722, CVE-2013-2723, CVE-2013-2725, CVE-2013-2726, CVE-2013-2731, CVE-2013-2732, CVE-2013-2734, CVE-2013-2735, CVE-2013-2736, CVE-2013-3337, CVE-2013-3339, CVE-2013-3340, and CVE-2013-3341.

Affected configurations

NVD
Node
adobeacrobat_readerMatch9.0
OR
adobeacrobat_readerMatch9.1
OR
adobeacrobat_readerMatch9.1.1
OR
adobeacrobat_readerMatch9.1.2
OR
adobeacrobat_readerMatch9.1.3
OR
adobeacrobat_readerMatch9.2
OR
adobeacrobat_readerMatch9.3
OR
adobeacrobat_readerMatch9.3.1
OR
adobeacrobat_readerMatch9.3.2
OR
adobeacrobat_readerMatch9.3.3
OR
adobeacrobat_readerMatch9.3.4
OR
adobeacrobat_readerMatch9.4
OR
adobeacrobat_readerMatch9.4.1
OR
adobeacrobat_readerMatch9.4.2
OR
adobeacrobat_readerMatch9.4.3
OR
adobeacrobat_readerMatch9.4.4
OR
adobeacrobat_readerMatch9.4.5
OR
adobeacrobat_readerMatch9.4.6
OR
adobeacrobat_readerMatch9.4.7
OR
adobeacrobat_readerMatch9.5
OR
adobeacrobat_readerMatch9.5.1
OR
adobeacrobat_readerMatch9.5.2
OR
adobeacrobat_readerMatch9.5.3
OR
adobeacrobat_readerMatch9.5.4
Node
adobeacrobat_readerMatch10.0
OR
adobeacrobat_readerMatch10.0.1
OR
adobeacrobat_readerMatch10.0.2
OR
adobeacrobat_readerMatch10.0.3
OR
adobeacrobat_readerMatch10.1
OR
adobeacrobat_readerMatch10.1.1
OR
adobeacrobat_readerMatch10.1.2
OR
adobeacrobat_readerMatch10.1.3
OR
adobeacrobat_readerMatch10.1.4
OR
adobeacrobat_readerMatch10.1.5
OR
adobeacrobat_readerMatch10.1.6
Node
adobeacrobat_readerMatch11.0
OR
adobeacrobat_readerMatch11.0.1
OR
adobeacrobat_readerMatch11.0.2
Node
adobeacrobatMatch9.0
OR
adobeacrobatMatch9.0-pro
OR
adobeacrobatMatch9.1
OR
adobeacrobatMatch9.1-pro
OR
adobeacrobatMatch9.1.1
OR
adobeacrobatMatch9.1.1-
OR
adobeacrobatMatch9.1.2
OR
adobeacrobatMatch9.1.3
OR
adobeacrobatMatch9.1.3-
OR
adobeacrobatMatch9.2
OR
adobeacrobatMatch9.2-
OR
adobeacrobatMatch9.3
OR
adobeacrobatMatch9.3-pro
OR
adobeacrobatMatch9.3.1
OR
adobeacrobatMatch9.3.1-
OR
adobeacrobatMatch9.3.2
OR
adobeacrobatMatch9.3.2-
OR
adobeacrobatMatch9.3.3
OR
adobeacrobatMatch9.3.4
OR
adobeacrobatMatch9.3.4-
OR
adobeacrobatMatch9.4
OR
adobeacrobatMatch9.4.1
OR
adobeacrobatMatch9.4.1-
OR
adobeacrobatMatch9.4.2
OR
adobeacrobatMatch9.4.2-
OR
adobeacrobatMatch9.4.3
OR
adobeacrobatMatch9.4.3-
OR
adobeacrobatMatch9.4.4
OR
adobeacrobatMatch9.4.4-
OR
adobeacrobatMatch9.4.5
OR
adobeacrobatMatch9.4.5-
OR
adobeacrobatMatch9.4.6
OR
adobeacrobatMatch9.4.6-
OR
adobeacrobatMatch9.4.7
OR
adobeacrobatMatch9.5
OR
adobeacrobatMatch9.5.1
OR
adobeacrobatMatch9.5.2
OR
adobeacrobatMatch9.5.3
OR
adobeacrobatMatch9.5.4
Node
adobeacrobatMatch10.0
OR
adobeacrobatMatch10.0-pro
OR
adobeacrobatMatch10.0.1
OR
adobeacrobatMatch10.0.1-pro
OR
adobeacrobatMatch10.0.2
OR
adobeacrobatMatch10.0.3
OR
adobeacrobatMatch10.1
OR
adobeacrobatMatch10.1.1
OR
adobeacrobatMatch10.1.2
OR
adobeacrobatMatch10.1.3
OR
adobeacrobatMatch10.1.4
OR
adobeacrobatMatch10.1.5
OR
adobeacrobatMatch10.1.6
Node
adobeacrobatMatch11.0
OR
adobeacrobatMatch11.0.1
OR
adobeacrobatMatch11.0.2

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

7.7 High

AI Score

Confidence

Low

0.292 Low

EPSS

Percentile

96.9%