- Description
- Integer overflow in Adobe Reader and Acrobat 9.x before 9.5.5, 10.x before 10.1.7, and 11.x before 11.0.03 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2013-2727.
- Source
- psirt@adobe.com
- NVD status
- Analyzed
CVSS 3.1
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
CVSS 2.0
- Type
- Primary
- Base score
- 10
- Impact score
- 10
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:C/I:C/A:C
Data from CISA
- Vulnerability name
- Adobe Reader and Acrobat Arbitrary Integer Overflow Vulnerability
- Exploit added on
- Mar 28, 2022
- Exploit action due
- Apr 18, 2022
- Required action
- Apply updates per vendor instructions.
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "413B5753-2B8D-44F6-B3A3-3CB4C9E8B68E",
"versionEndExcluding": "9.5.5",
"versionStartIncluding": "9.0"
},
{
"criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "46FE52E1-6878-41E8-9898-B0C93DB1A711",
"versionEndExcluding": "10.1.7",
"versionStartIncluding": "10.0"
},
{
"criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "64498BAE-6B93-4171-987C-DA0D7E5586B6",
"versionEndExcluding": "11.0.03",
"versionStartIncluding": "11.0"
},
{
"criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "59FB20F5-387E-4DB3-A2D5-E027C678B771",
"versionEndExcluding": "9.5.5",
"versionStartIncluding": "9.0"
},
{
"criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "085F0347-0232-481A-8275-E19A9A0631AD",
"versionEndExcluding": "10.1.7",
"versionStartIncluding": "10.0"
},
{
"criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "847908BF-1CD9-485F-93D7-5EB600DD7220",
"versionEndExcluding": "11.0.03",
"versionStartIncluding": "11.0"
}
],
"operator": "OR"
}
]
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:-:*:*:*",
"vulnerable": true,
"matchCriteriaId": "4339DE06-19FB-4B8E-B6AE-3495F605AD05"
},
{
"criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "00720D8C-3FF3-4B1C-B74B-91F01A544399"
}
],
"operator": "OR"
}
]
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97"
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "6252E88C-27FF-420D-A64A-C34124CF7E6A"
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "8A8E07B7-3739-4BEB-88F8-C7F62431E889"
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0"
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "92C9F1C4-55B0-426D-BB5E-01372C23AF97"
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "AF83BB87-B203-48F9-9D06-48A5FE399050"
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "E5ED5807-55B7-47C5-97A6-03233F4FBC3A"
}
],
"operator": "OR"
}
]
}
]