CVE-2013-4986
Published Oct 4, 2013
Last updated 11 years ago
Overview
- Description
- Stack-based buffer overflow in PDFAX0722_IconCool.dll 7.22.1125.2121 in IconCool PDFCool Studio 3.32 Build 130330 and earlier allows remote attackers to execute arbitrary code via a crafted PDF file.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 6.8
- Impact score
- 6.4
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-119
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:iconcool:pdfcool_studio:*:build130330:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CE927616-364A-47FD-A8F2-B729CF782DD1", "versionEndIncluding": "3.32" }, { "criteria": "cpe:2.3:a:iconcool:pdfcool_studio:2.0:build110427:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E22F83EF-815B-4189-940F-F72C99FFEA23" }, { "criteria": "cpe:2.3:a:iconcool:pdfcool_studio:2.0:build110502:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C4421A6A-EC4F-4E49-95B6-37EB07BA181C" }, { "criteria": "cpe:2.3:a:iconcool:pdfcool_studio:2.0:build110508:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "793764EB-2126-4373-A8C3-06E8F3D0DF82" }, { "criteria": "cpe:2.3:a:iconcool:pdfcool_studio:2.0:build110510:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F3BB88EC-01A2-4DC7-AB28-F528A5173D25" }, { "criteria": "cpe:2.3:a:iconcool:pdfcool_studio:2.0:build110512:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BCAEDB87-E317-4C85-B76B-64EB9520D7A7" }, { "criteria": "cpe:2.3:a:iconcool:pdfcool_studio:2.5:build120405:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EC35DEEC-5D05-4236-A1DC-13BBA55D2244" }, { "criteria": "cpe:2.3:a:iconcool:pdfcool_studio:2.6:build120405:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A72A5C03-F83B-4C08-B0FD-8E1BCE065381" }, { "criteria": "cpe:2.3:a:iconcool:pdfcool_studio:2.7:build120405:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2A24C381-237D-4110-AA54-B267B97D1847" }, { "criteria": "cpe:2.3:a:iconcool:pdfcool_studio:2.8:build120518:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F25243D1-1334-414A-AD72-AF41A45A00FB" }, { "criteria": "cpe:2.3:a:iconcool:pdfcool_studio:2.10:build110519:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "288EDBD5-0DA2-43E1-BD0E-9194B2904A31" }, { "criteria": "cpe:2.3:a:iconcool:pdfcool_studio:2.10:build110523:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D2B4FFD9-F07E-402D-9466-183A02E9D957" }, { "criteria": "cpe:2.3:a:iconcool:pdfcool_studio:2.12:build110528:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9E483482-8134-4C7B-94AB-8DEB20057A73" }, { "criteria": "cpe:2.3:a:iconcool:pdfcool_studio:2.14:build110608:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "752C6451-01CC-4A70-AE25-9327DAF09F6D" }, { "criteria": "cpe:2.3:a:iconcool:pdfcool_studio:2.16:build110612:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9C07F0B9-8606-4AE8-A287-77EFCDA4F7B0" }, { "criteria": "cpe:2.3:a:iconcool:pdfcool_studio:2.20:build110707:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0782767B-35F8-4773-8971-887D83D94977" }, { "criteria": "cpe:2.3:a:iconcool:pdfcool_studio:2.24:build1110801:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ABF1E406-151C-433D-B63E-3DEA503F228B" }, { "criteria": "cpe:2.3:a:iconcool:pdfcool_studio:2.26:build110823:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "12780165-8FAB-4FB1-99DA-473F17CFBC60" }, { "criteria": "cpe:2.3:a:iconcool:pdfcool_studio:2.30:build110920:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F1EFD1C3-AA97-4481-B951-0E7568CC7157" }, { "criteria": "cpe:2.3:a:iconcool:pdfcool_studio:2.40:build111016:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3CE505AE-844A-4D8A-9152-029263A2A504" }, { "criteria": "cpe:2.3:a:iconcool:pdfcool_studio:3.0:build121022:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4E48EE0F-5DFB-4ECD-87BB-0561EDDEF9E0" } ], "operator": "OR" } ] } ]