Vulnerability Name:

CVE-2013-2730 (CCN-84225)

Assigned:2013-05-14
Published:2013-05-14
Updated:2017-09-19
Summary:Buffer overflow in Adobe Reader and Acrobat 9.x before 9.5.5, 10.x before 10.1.7, and 11.x before 11.0.03 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2013-2733.
CVSS v3 Severity:10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
8.3 High (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
9.3 High (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
7.7 High (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
6.8 Medium (REDHAT CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
5.6 Medium (REDHAT Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:F/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-119
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2013-2730

Source: SUSE
Type: UNKNOWN
SUSE-SU-2013:0809

Source: CCN
Type: RHSA-2013-0826
Critical: acroread security update

Source: REDHAT
Type: UNKNOWN
RHSA-2013:0826

Source: CCN
Type: SA53420
Adobe Reader / Acrobat Multiple Vulnerabilities

Source: GENTOO
Type: UNKNOWN
GLSA-201308-03

Source: CCN
Type: Adobe Product Security Bulletin APSB13-15
Security updates available for Adobe Reader and Acrobat

Source: CONFIRM
Type: Patch, Vendor Advisory
http://www.adobe.com/support/security/bulletins/apsb13-15.html

Source: BID
Type: Exploit
59923

Source: CCN
Type: BID-59923
Adobe Acrobat and Reader CVE-2013-2730 Remote Buffer Overflow Vulnerability

Source: XF
Type: UNKNOWN
adobe-cve20132730-bo(84225)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:16631

Source: CCN
Type: Packet Storm Security [05-23-2013]
AdobeCollabSync Buffer Overflow Adobe Reader X Sandbox Bypass

Source: EXPLOIT-DB
Type: EXPLOIT
Offensive Security Exploit Database [05-26-2013]

Source: EXPLOIT-DB
Type: EXPLOIT
Offensive Security Exploit Database [05-28-2013]

Source: CCN
Type: WhiteSource Vulnerability Database
CVE-2013-2730

Vulnerable Configuration:Configuration 1:
  • cpe:/a:adobe:acrobat_reader:11.0:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:11.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:11.0.2:*:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/a:adobe:acrobat:10.0:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:10.0:-:pro:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:10.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:10.0.1:-:pro:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:10.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:10.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:10.1:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:10.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:10.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:10.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:10.1.4:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:10.1.5:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:10.1.6:*:*:*:*:*:*:*

  • Configuration 3:
  • cpe:/a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:9.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:9.2:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:9.3:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:9.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:9.3.2:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:9.3.3:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:9.3.4:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:9.4:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:9.4.1:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:9.4.2:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:9.4.3:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:9.4.4:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:9.4.5:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:9.4.6:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:9.4.7:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:9.5:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:9.5.1:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:9.5.2:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:9.5.3:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:9.5.4:*:*:*:*:*:*:*

  • Configuration 4:
  • cpe:/a:adobe:acrobat:9.0:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:9.0:-:pro:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:9.1:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:9.1:-:pro:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:9.1.1:-:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:9.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:9.1.3:-:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:9.2:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:9.2:-:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:9.3:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:9.3:-:pro:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:9.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:9.3.1:-:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:9.3.2:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:9.3.2:-:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:9.3.3:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:9.3.4:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:9.3.4:-:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:9.4:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:9.4.1:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:9.4.1:-:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:9.4.2:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:9.4.2:-:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:9.4.3:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:9.4.3:-:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:9.4.4:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:9.4.4:-:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:9.4.5:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:9.4.5:-:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:9.4.6:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:9.4.6:-:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:9.4.7:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:9.5:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:9.5.1:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:9.5.2:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:9.5.3:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:9.5.4:*:*:*:*:*:*:*

  • Configuration 5:
  • cpe:/a:adobe:acrobat_reader:10.0:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:10.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:10.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:10.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:10.1:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:10.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:10.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:10.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:10.1.4:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:10.1.5:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:10.1.6:*:*:*:*:*:*:*

  • Configuration 6:
  • cpe:/a:adobe:acrobat:11.0:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:11.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:11.0.2:*:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/a:redhat:rhel_extras:6:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/a:redhat:rhel_extras:5:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:adobe:acrobat_x:10.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_x:10.1:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_x:10.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:9.5.4:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:9.5.4:*:*:*:*:*:*:*
  • AND
  • cpe:/o:redhat:enterprise_linux_server_supplementary:6:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_workstation_supplementary:6:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_desktop_supplementary:6:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20132730
    V
    CVE-2013-2730
    2021-06-25
    oval:org.mitre.oval:def:20740
    P
    RHSA-2013:0826: acroread security update (Critical)
    2015-03-09
    oval:org.mitre.oval:def:25336
    P
    SUSE-SU-2013:0809-1 -- Security update for Acrobat Reader
    2014-09-08
    oval:org.mitre.oval:def:23771
    P
    ELSA-2013:0826: acroread security update (Critical)
    2014-05-26
    oval:org.mitre.oval:def:16631
    V
    Buffer overflow in Adobe Reader and Acrobat 9.x before 9.5.5, 10.x before 10.1.7, and 11.x before 11.0.03 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2013-2733
    2013-07-08
    oval:com.ubuntu.precise:def:20132730000
    V
    CVE-2013-2730 on Ubuntu 12.04 LTS (precise) - medium.
    2013-05-16
    oval:com.redhat.rhsa:def:20130826
    P
    RHSA-2013:0826: acroread security update (Critical)
    2013-05-15
    BACK
    adobe acrobat reader 11.0
    adobe acrobat reader 11.0.1
    adobe acrobat reader 11.0.2
    adobe acrobat 10.0
    adobe acrobat 10.0 -
    adobe acrobat 10.0.1
    adobe acrobat 10.0.1 -
    adobe acrobat 10.0.2
    adobe acrobat 10.0.3
    adobe acrobat 10.1
    adobe acrobat 10.1.1
    adobe acrobat 10.1.2
    adobe acrobat 10.1.3
    adobe acrobat 10.1.4
    adobe acrobat 10.1.5
    adobe acrobat 10.1.6
    adobe acrobat reader 9.0
    adobe acrobat reader 9.1
    adobe acrobat reader 9.1.1
    adobe acrobat reader 9.1.2
    adobe acrobat reader 9.1.3
    adobe acrobat reader 9.2
    adobe acrobat reader 9.3
    adobe acrobat reader 9.3.1
    adobe acrobat reader 9.3.2
    adobe acrobat reader 9.3.3
    adobe acrobat reader 9.3.4
    adobe acrobat reader 9.4
    adobe acrobat reader 9.4.1
    adobe acrobat reader 9.4.2
    adobe acrobat reader 9.4.3
    adobe acrobat reader 9.4.4
    adobe acrobat reader 9.4.5
    adobe acrobat reader 9.4.6
    adobe acrobat reader 9.4.7
    adobe acrobat reader 9.5
    adobe acrobat reader 9.5.1
    adobe acrobat reader 9.5.2
    adobe acrobat reader 9.5.3
    adobe acrobat reader 9.5.4
    adobe acrobat 9.0
    adobe acrobat 9.0 -
    adobe acrobat 9.1
    adobe acrobat 9.1 -
    adobe acrobat 9.1.1
    adobe acrobat 9.1.1 -
    adobe acrobat 9.1.2
    adobe acrobat 9.1.3
    adobe acrobat 9.1.3 -
    adobe acrobat 9.2
    adobe acrobat 9.2 -
    adobe acrobat 9.3
    adobe acrobat 9.3 -
    adobe acrobat 9.3.1
    adobe acrobat 9.3.1 -
    adobe acrobat 9.3.2
    adobe acrobat 9.3.2 -
    adobe acrobat 9.3.3
    adobe acrobat 9.3.4
    adobe acrobat 9.3.4 -
    adobe acrobat 9.4
    adobe acrobat 9.4.1
    adobe acrobat 9.4.1 -
    adobe acrobat 9.4.2
    adobe acrobat 9.4.2 -
    adobe acrobat 9.4.3
    adobe acrobat 9.4.3 -
    adobe acrobat 9.4.4
    adobe acrobat 9.4.4 -
    adobe acrobat 9.4.5
    adobe acrobat 9.4.5 -
    adobe acrobat 9.4.6
    adobe acrobat 9.4.6 -
    adobe acrobat 9.4.7
    adobe acrobat 9.5
    adobe acrobat 9.5.1
    adobe acrobat 9.5.2
    adobe acrobat 9.5.3
    adobe acrobat 9.5.4
    adobe acrobat reader 10.0
    adobe acrobat reader 10.0.1
    adobe acrobat reader 10.0.2
    adobe acrobat reader 10.0.3
    adobe acrobat reader 10.1
    adobe acrobat reader 10.1.1
    adobe acrobat reader 10.1.2
    adobe acrobat reader 10.1.3
    adobe acrobat reader 10.1.4
    adobe acrobat reader 10.1.5
    adobe acrobat reader 10.1.6
    adobe acrobat 11.0
    adobe acrobat 11.0.1
    adobe acrobat 11.0.2
    adobe acrobat x 10.0.3
    adobe acrobat x 10.1
    adobe acrobat x 10.1.3
    adobe acrobat reader 9.5.4
    adobe acrobat 9.5.4
    redhat enterprise linux server supplementary 6
    redhat enterprise linux workstation supplementary 6
    redhat enterprise linux desktop supplementary 6