10
CVSSv2

CVE-2013-2729

Published: 16/05/2013 Updated: 19/09/2017
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 1000
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Integer overflow in Adobe Reader and Acrobat 9.x prior to 9.5.5, 10.x prior to 10.1.7, and 11.x prior to 11.0.03 allows malicious users to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2013-2727.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

adobe acrobat reader 9.1

adobe acrobat reader 9.4.7

adobe acrobat reader 9.5.2

adobe acrobat reader 9.1.3

adobe acrobat reader 9.4.3

adobe acrobat reader 9.1.1

adobe acrobat reader 9.4.5

adobe acrobat reader 9.3.2

adobe acrobat reader 9.3.4

adobe acrobat reader 9.4.1

adobe acrobat reader 9.4.2

adobe acrobat reader 9.2

adobe acrobat reader 9.4.4

adobe acrobat reader 9.4

adobe acrobat reader 9.4.6

adobe acrobat reader 9.1.2

adobe acrobat reader 9.5.1

adobe acrobat reader 9.3.3

adobe acrobat reader 9.3.1

adobe acrobat reader 9.3

adobe acrobat reader 9.5

adobe acrobat reader 9.0

adobe acrobat reader 9.5.3

adobe acrobat reader 9.5.4

adobe acrobat reader 10.1.5

adobe acrobat reader 10.0.3

adobe acrobat reader 10.0.1

adobe acrobat reader 10.1

adobe acrobat reader 10.1.4

adobe acrobat reader 10.1.6

adobe acrobat reader 10.1.2

adobe acrobat reader 10.1.3

adobe acrobat reader 10.0

adobe acrobat reader 10.1.1

adobe acrobat reader 10.0.2

adobe acrobat reader 11.0

adobe acrobat reader 11.0.1

adobe acrobat reader 11.0.2

adobe acrobat 9.4.3

adobe acrobat 9.4.6

adobe acrobat 9.1

adobe acrobat 9.0

adobe acrobat 9.4.1

adobe acrobat 9.5

adobe acrobat 9.1.1

adobe acrobat 9.4

adobe acrobat 9.5.3

adobe acrobat 9.5.4

adobe acrobat 9.4.4

adobe acrobat 9.4.2

adobe acrobat 9.3.3

adobe acrobat 9.3

adobe acrobat 9.3.4

adobe acrobat 9.2

adobe acrobat 9.3.1

adobe acrobat 9.1.2

adobe acrobat 9.5.2

adobe acrobat 9.5.1

adobe acrobat 9.4.5

adobe acrobat 9.3.2

adobe acrobat 9.1.3

adobe acrobat 9.4.7

adobe acrobat 10.1.1

adobe acrobat 10.1.3

adobe acrobat 10.1.4

adobe acrobat 10.0

adobe acrobat 10.1.6

adobe acrobat 10.0.1

adobe acrobat 10.0.2

adobe acrobat 10.1

adobe acrobat 10.1.5

adobe acrobat 10.1.2

adobe acrobat 10.0.3

adobe acrobat 11.0

adobe acrobat 11.0.1

adobe acrobat 11.0.2

Vendor Advisories

Integer overflow in Adobe Reader and Acrobat 9x before 955, 10x before 1017, and 11x before 11003 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2013-2727 ...

Exploits

''' Title: Adobe Reader X BMP/RLE heap corruption Product: Adobe Reader X Version: 10x Product Homepage: adobecom Binary affected: AcroFormapi Binary Version: 101438 Binary MD5: 8e0fc0c6f206b84e265cc3076c4b9841 Configuration Requirements ----------------------------------------- Default configuration Vulnerability Requirements ------------- ...

Github Repositories

A Python 3 upgrade to Peepdf

peepdf-3 - peepdf for Python 3 peepdf-3 is a Python 3 tool to explore PDF files in order to find out if the file can be harmful or not The aim of this tool is to provide all the necessary components that a security researcher could need in a PDF analysis without using 3 or 4 tools to make all the tasks With peepdf it's possible to see all the objects in the document show

peepdf is a Python tool to explore PDF files in order to find out if the file can be harmful or not The aim of this tool is to provide all the necessary components that a security researcher could need in a PDF analysis without using 3 or 4 tools to make all the tasks With peepdf it's possible to see all the objects in the document showing the suspicious elements, suppor

Powerful Python tool to analyze PDF documents

peepdf is a Python tool to explore PDF files in order to find out if the file can be harmful or not The aim of this tool is to provide all the necessary components that a security researcher could need in a PDF analysis without using 3 or 4 tools to make all the tasks With peepdf it's possible to see all the objects in the document showing the suspicious elements, suppor

🇦🇷 A list of cool projects made in Argentina

made-in-argentina 🇦🇷 A list of cool projects made in Argentina Contents JavaScript Java C# CSS HTML C C++ ActionScript Clojure CoffeeScript Go Haskell Lua Matlab Objective-C Perl PHP Python R Ruby Scala Shell Swift TeX VimL JavaScript 🌟 Name Description 🌍 8169 @mgonto/restangular AngularJS service to handle Rest API Restful Resources properly and

#Adobe Reader BMP/RLE heap corruption - CVE-2013-2729 Adobe Reader X is a powerful software solution developed by Adobe Systems to view, create, manipulate, print and manage files in Portable Document Format (PDF) Since version 10 it includes the Protected Mode, a sandbox technology similar to the one in Google Chrome which improves the overall security of the product Title:

Recent Articles

The Epic Turla Operation
Securelist • GReAT • 07 Aug 2014

Technical Appendix with IOCs Over the last 10 months, Kaspersky Lab researchers have analyzed a massive cyber-espionage operation which we call “Epic Turla”. The attackers behind Epic Turla have infected several hundred computers in more than 45 countries, including government institutions, embassies, military, education, research and pharmaceutical companies. The attacks are known to have used at least two zero-day exploits: We also observed exploits against older (patched) vulnerabilities,...