Vulnerability Details : CVE-2013-3355
Adobe Reader and Acrobat before 10.1.8 and 11.x before 11.0.04 on Windows and Mac OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-3352 and CVE-2013-3354.
Vulnerability category: OverflowMemory CorruptionExecute codeDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2013-3355
Probability of exploitation activity in the next 30 days: 0.62%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 76 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2013-3355
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
CWE ids for CVE-2013-3355
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2013-3355
-
http://www.adobe.com/support/security/bulletins/apsb13-22.html
Adobe - Security Bulletins: APSB13-22 - Prenotification Security Advisory for Adobe Reader and AcrobatPatch;Vendor Advisory
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18826
Repository / Oval Repository
Products affected by CVE-2013-3355
- cpe:2.3:a:adobe:acrobat_reader:10.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:10.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:10.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:10.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:10.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:10.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:10.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:10.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:10.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:11.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:10.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:11.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:10.1.6:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:11.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:11.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat_reader:10.1.7:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:10.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:10.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:10.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:10.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:10.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:10.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:10.0:-:pro:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:10.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:10.0.1:-:pro:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:10.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:10.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:11.0:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:10.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:11.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:10.1.6:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:11.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:10.1.7:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:acrobat:11.0.3:*:*:*:*:*:*:*