KLA10457
Adobe Acrobat & Reader multiple vulnerabilities
Updated: 06/18/2020
Detect date
?
08/08/2013
Severity
?
Critical
Description

Multiple serious vulnerabilities have been found in Adobe Acrobat & Reader. Malicious users can exploit these vulnerabilities to cause denial of service, bypass security, obtain sensitive information or arbitrary code execution.

Below is a complete list of vulnerabilities

  1. An unspecified vulnerability can be exploited remotely via vectors related to sandbox;
  2. Stack-based buffer overflow, integer overflow and buffer overflow can be exploited remotely via an unspecified vectors;
  3. An unspecified vulnerability can be exploited via vectors related to JavaScript API;
  4. Improper domains blacklist handling can be exploited via unspecified vectors.
Affected products

Adobe Reader XI versions 11.0.02 and earlier
Adobe Reader X versions 10.1.6 and earlier
Adobe Reader 9 versions 9.5.4 and earlier
Adobe Acrobat XI versions 11.0.02 and earlier
Adobe Acrobat X versions 10.1.6 and earlier
Adobe Acrobat 9 versions 9.5.4 and earlier

Solution

Update to latest version
get reader

Original advisories

APSB

Impacts
?
ACE 
[?]

OSI 
[?]

DoS 
[?]

SB 
[?]
Related products
Adobe Reader
Adobe Acrobat
Adobe Reader X
Adobe Acrobat X
Adobe Reader XI
Adobe Acrobat XI
CVE-IDS
?
CVE-2013-334610.0Critical
CVE-2013-334210.0Critical
CVE-2013-334110.0Critical
CVE-2013-334010.0Critical
CVE-2013-333910.0Critical
CVE-2013-333810.0Critical
CVE-2013-333710.0Critical
CVE-2013-273610.0Critical
CVE-2013-27375.0Critical
CVE-2013-273410.0Critical
CVE-2013-273510.0Critical
CVE-2013-273210.0Critical
CVE-2013-273310.0Critical
CVE-2013-273010.0Critical
CVE-2013-273110.0Critical
CVE-2013-272710.0Critical
CVE-2013-272910.0Critical
CVE-2013-272610.0Critical
CVE-2013-272510.0Critical
CVE-2013-271810.0Critical
CVE-2013-25507.5Critical
CVE-2013-272010.0Critical
CVE-2013-271910.0Critical
CVE-2013-272210.0Critical
CVE-2013-272110.0Critical
CVE-2013-272410.0Critical
CVE-2013-272310.0Critical
CVE-2013-25497.5Critical
Exploitation

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.