Vulnerability Details : CVE-2012-0777
The JavaScript API in Adobe Reader and Acrobat 9.x before 9.5.1 and 10.x before 10.1.3 on Mac OS X and Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
Vulnerability category: OverflowMemory CorruptionExecute codeDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2012-0777
Probability of exploitation activity in the next 30 days: 1.02%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 82 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2012-0777
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST |
CWE ids for CVE-2012-0777
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2012-0777
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/74735
Adobe Acrobat and Reader JavaScript API code execution CVE-2012-0777 Vulnerability ReportThird Party Advisory;VDB Entry
-
http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00013.html
[security-announce] openSUSE-SU-2012:0512-1: important: update for acrorBroken Link;Mailing List;Third Party Advisory
-
http://www.us-cert.gov/cas/techalerts/TA12-101B.html
Adobe Reader and Acrobat Security Updates and Architectural Improvements | CISAMitigation;Third Party Advisory;US Government Resource
-
http://www.securitytracker.com/id?1026908
Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code - SecurityTrackerBroken Link;Third Party Advisory;VDB Entry
-
http://rhn.redhat.com/errata/RHSA-2012-0469.html
RHSA-2012:0469 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00017.html
[security-announce] SUSE-SU-2012:0524-1: important: Security update forBroken Link;Mailing List;Third Party Advisory
-
http://www.securityfocus.com/bid/52950
Adobe Acrobat and Reader (CVE-2012-0777) Memory Corruption VulnerabilityBroken Link;Third Party Advisory;VDB Entry
-
http://www.adobe.com/support/security/bulletins/apsb12-08.html
Adobe - Security Bulletins: APSB12-08 - Security updates available for Adobe Reader and AcrobatVendor Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00016.html
[security-announce] SUSE-SU-2012:0522-1: important: Security update forBroken Link;Mailing List;Third Party Advisory
Products affected by CVE-2012-0777
- cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*