CVE-2013-0641

7.8 HIGH CISA KEV - Actively Exploited
Published: February 14, 2013 Modified: October 22, 2025

Description

Buffer overflow in Adobe Reader and Acrobat 9.x before 9.5.4, 10.x before 10.1.6, and 11.x before 11.0.02 allows remote attackers to execute arbitrary code via a crafted PDF document, as exploited in the wild in February 2013.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00021.html
Source: psirt@adobe.com
Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00023.html
Source: psirt@adobe.com
Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00024.html
Source: psirt@adobe.com
Mailing List Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2013-0551.html
Source: psirt@adobe.com
Third Party Advisory
http://security.gentoo.org/glsa/glsa-201308-03.xml
Source: psirt@adobe.com
Third Party Advisory
http://www.kb.cert.org/vuls/id/422807
Source: psirt@adobe.com
Third Party Advisory US Government Resource
http://blog.fireeye.com/research/2013/02/in-turn-its-pdf-time.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://blogs.adobe.com/psirt/2013/02/adobe-reader-and-acrobat-vulnerability-report.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Vendor Advisory
http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00021.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00023.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00024.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2013-0551.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://security.gentoo.org/glsa/glsa-201308-03.xml
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.adobe.com/support/security/advisories/apsa13-02.html
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.adobe.com/support/security/bulletins/apsb13-07.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.kb.cert.org/vuls/id/422807
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory US Government Resource

25 reference(s) from NVD

Quick Stats

CVSS v3 Score
7.8 / 10.0
EPSS (Exploit Probability)
88.4%
99th percentile
Exploitation Status
Actively Exploited
Remediation due: 2022-03-24

Weaknesses (CWE)

Affected Vendors

suse redhat adobe linux microsoft apple opensuse