Vulnerabilities > CVE-2013-3346 - Out-of-bounds Write vulnerability in Adobe Acrobat and Acrobat Reader
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
HIGH Integrity impact
HIGH Availability impact
HIGH Summary
Adobe Reader and Acrobat 9.x before 9.5.5, 10.x before 10.1.7, and 11.x before 11.0.03 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2718, CVE-2013-2719, CVE-2013-2720, CVE-2013-2721, CVE-2013-2722, CVE-2013-2723, CVE-2013-2725, CVE-2013-2726, CVE-2013-2731, CVE-2013-2732, CVE-2013-2734, CVE-2013-2735, CVE-2013-2736, CVE-2013-3337, CVE-2013-3338, CVE-2013-3339, CVE-2013-3340, and CVE-2013-3341.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Exploit-Db
description | Adobe Reader ToolButton - Use After Free. CVE-2013-3346. Remote exploit for windows platform |
id | EDB-ID:30394 |
last seen | 2016-02-03 |
modified | 2013-12-17 |
published | 2013-12-17 |
reporter | metasploit |
source | https://www.exploit-db.com/download/30394/ |
title | Adobe Reader ToolButton - Use After Free |
Metasploit
description This module exploits a use after free condition on Adobe Reader versions 11.0.2, 10.1.6 and 9.5.4 and prior. The vulnerability exists while handling the ToolButton object, where the cEnable callback can be used to early free the object memory. Later use of the object allows triggering the use after free condition. This module has been tested successfully on Adobe Reader 11.0.2, 10.0.4 and 9.5.0 on Windows XP SP3, as exploited in the wild in November, 2013. id MSF:EXPLOIT/WINDOWS/FILEFORMAT/ADOBE_TOOLBUTTON last seen 2020-06-08 modified 2017-09-14 published 2013-12-16 references reporter Rapid7 source https://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/windows/fileformat/adobe_toolbutton.rb title Adobe Reader ToolButton Use After Free description This module exploits an use after free condition on Adobe Reader versions 11.0.2, 10.1.6 and 9.5.4 and prior. The vulnerability exists while handling the ToolButton object, where the cEnable callback can be used to early free the object memory. Later use of the object allows triggering the use after free condition. This module has been tested successfully on Adobe Reader 11.0.2 and 10.0.4, with IE and Windows XP SP3, as exploited in the wild in November, 2013. At the moment, this module doesn't support Adobe Reader 9 targets; in order to exploit Adobe Reader 9 the fileformat version of the exploit can be used. id MSF:EXPLOIT/WINDOWS/BROWSER/ADOBE_TOOLBUTTON last seen 2020-06-08 modified 2017-07-24 published 2013-12-16 references reporter Rapid7 source https://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/windows/browser/adobe_toolbutton.rb title Adobe Reader ToolButton Use After Free
Nessus
NASL family MacOS X Local Security Checks NASL id MACOSX_ADOBE_READER_APSB13-15.NASL description The version of Adobe Reader installed on the remote Mac OS X host is prior to 11.0.3, 10.1.7, or 9.5.5. It is, therefore, affected by the following vulnerabilities : - Unspecified memory corruption issues exist that allow an attacker to execute arbitrary code. (CVE-2013-2718, CVE-2013-2719, CVE-2013-2720, CVE-2013-2721, CVE-2013-2722, CVE-2013-2723, CVE-2013-2725, CVE-2013-2726, CVE-2013-2731, CVE-2013-2732, CVE-2013-2734, CVE-2013-2735, CVE-2013-2736, CVE-2013-3337, CVE-2013-3338, CVE-2013-3339, CVE-2013-3340, CVE-2013-3341, CVE-2013-3346) - An integer underflow condition exists that allows an attacker to execute arbitrary code. (CVE-2013-2549) - A use-after-free error exists that allows an attacker to bypass the Adobe Reader last seen 2020-06-01 modified 2020-06-02 plugin id 66411 published 2013-05-14 reporter This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/66411 title Adobe Reader < 11.0.3 / 10.1.7 / 9.5.5 Multiple Vulnerabilities (APSB13-15) (Mac OS X) NASL family Red Hat Local Security Checks NASL id REDHAT-RHSA-2013-0826.NASL description Updated acroread packages that fix multiple security issues are now available for Red Hat Enterprise Linux 5 and 6 Supplementary. The Red Hat Security Response Team has rated this update as having critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. Adobe Reader allows users to view and print documents in Portable Document Format (PDF). This update fixes multiple security flaws in Adobe Reader. These flaws are detailed in the Adobe Security bulletin APSB13-15, listed in the References section. A specially crafted PDF file could cause Adobe Reader to crash or, potentially, execute arbitrary code as the user running Adobe Reader when opened. (CVE-2013-2549, CVE-2013-2718, CVE-2013-2719, CVE-2013-2720, CVE-2013-2721, CVE-2013-2722, CVE-2013-2723, CVE-2013-2724, CVE-2013-2725, CVE-2013-2726, CVE-2013-2727, CVE-2013-2729, CVE-2013-2730, CVE-2013-2731, CVE-2013-2732, CVE-2013-2733, CVE-2013-2734, CVE-2013-2735, CVE-2013-2736, CVE-2013-3337, CVE-2013-3338, CVE-2013-3339, CVE-2013-3340, CVE-2013-3341) This update also fixes an information leak flaw in Adobe Reader. (CVE-2013-2737) All Adobe Reader users should install these updated packages. They contain Adobe Reader version 9.5.5, which is not vulnerable to these issues. All running instances of Adobe Reader must be restarted for the update to take effect. last seen 2020-06-01 modified 2020-06-02 plugin id 66458 published 2013-05-16 reporter This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/66458 title RHEL 5 / 6 : acroread (RHSA-2013:0826) NASL family Gentoo Local Security Checks NASL id GENTOO_GLSA-201309-10.NASL description The remote host is affected by the vulnerability described in GLSA-201309-10 (Adobe Reader: Arbitrary Code Execution) An unspecified vulnerability exists in Adobe Reader. Impact : An attacker could execute arbitrary code or cause a Denial of Service condition. Workaround : There is no known workaround at this time. last seen 2020-06-01 modified 2020-06-02 plugin id 69901 published 2013-09-15 reporter This script is Copyright (C) 2013-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/69901 title GLSA-201309-10 : Adobe Reader: Arbitrary Code Execution NASL family Windows NASL id ADOBE_ACROBAT_APSB13-15.NASL description The version of Adobe Acrobat installed on the remote host is earlier than 11.0.3 / 10.1.7 / 9.5.5. It is, therefore, affected by multiple vulnerabilities : - Unspecified memory corruption vulnerabilities exist that could lead to code execution. (CVE-2013-2718, CVE-2013-2719, CVE-2013-2720, CVE-2013-2721, CVE-2013-2722, CVE-2013-2723, CVE-2013-2725, CVE-2013-2726, CVE-2013-2731, CVE-2013-2732, CVE-2013-2734, CVE-2013-2735, CVE-2013-2736, CVE-2013-3337, CVE-2013-3338, CVE-2013-3339, CVE-2013-3340, CVE-2013-3341, CVE-2013-3346) - An integer underflow error exists that could lead to code execution. (CVE-2013-2549) - A use-after-free error exists that could lead to a bypass of Adobe Reader last seen 2020-06-01 modified 2020-06-02 plugin id 66409 published 2013-05-14 reporter This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/66409 title Adobe Acrobat < 11.0.3 / 10.1.7 / 9.5.5 Multiple Vulnerabilities (APSB13-15) NASL family Windows NASL id ADOBE_READER_APSB13-15.NASL description The version of Adobe Reader installed on the remote host is earlier than 11.0.3 / 10.1.7 / 9.5.5. It is, therefore, affected by multiple vulnerabilities : - Unspecified memory corruption vulnerabilities exist that could lead to code execution. (CVE-2013-2718, CVE-2013-2719, CVE-2013-2720, CVE-2013-2721, CVE-2013-2722, CVE-2013-2723, CVE-2013-2725, CVE-2013-2726, CVE-2013-2731, CVE-2013-2732, CVE-2013-2734, CVE-2013-2735, CVE-2013-2736, CVE-2013-3337, CVE-2013-3338, CVE-2013-3339, CVE-2013-3340, CVE-2013-3341, CVE-2013-3346) - An integer underflow error exists that could lead to code execution. (CVE-2013-2549) - A use-after-free error exists that could lead to a bypass of Adobe Reader last seen 2020-06-01 modified 2020-06-02 plugin id 66410 published 2013-05-14 reporter This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/66410 title Adobe Reader < 11.0.3 / 10.1.7 / 9.5.5 Multiple Vulnerabilities (APSB13-15)
Oval
accepted | 2013-11-26T13:49:24.582-05:00 | ||||||||||||||||||||||||
class | vulnerability | ||||||||||||||||||||||||
contributors |
| ||||||||||||||||||||||||
definition_extensions |
| ||||||||||||||||||||||||
description | Adobe Reader and Acrobat 9.x before 9.5.5, 10.x before 10.1.7, and 11.x before 11.0.03 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2718, CVE-2013-2719, CVE-2013-2720, CVE-2013-2721, CVE-2013-2722, CVE-2013-2723, CVE-2013-2725, CVE-2013-2726, CVE-2013-2731, CVE-2013-2732, CVE-2013-2734, CVE-2013-2735, CVE-2013-2736, CVE-2013-3337, CVE-2013-3338, CVE-2013-3339, CVE-2013-3340, and CVE-2013-3341. | ||||||||||||||||||||||||
family | windows | ||||||||||||||||||||||||
id | oval:org.mitre.oval:def:19054 | ||||||||||||||||||||||||
status | accepted | ||||||||||||||||||||||||
submitted | 2013-10-16T15:34:02.324-04:00 | ||||||||||||||||||||||||
title | Adobe Reader and Acrobat 9.x before 9.5.5, 10.x before 10.1.7, and 11.x before 11.0.03 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2718, CVE-2013-2719, CVE-2013-2720, CVE-2013-2721, CVE-2013-2722, CVE-2013-2723, CVE-2013-2725, CVE-2013-2726, CVE-2013-2731, CVE-2013-2732, CVE-2013-2734, CVE-2013-2735, CVE-2013-2736, CVE-2013-3337, CVE-2013-3338, CVE-2013-3339, CVE-2013-3340, and CVE-2013-3341 | ||||||||||||||||||||||||
version | 5 |
Packetstorm
data source https://packetstormsecurity.com/files/download/124464/windows-browser-adobe_toolbutton.rb.txt id PACKETSTORM:124464 last seen 2016-12-05 published 2013-12-17 reporter Soroush Dalili source https://packetstormsecurity.com/files/124464/Adobe-Reader-ToolButton-Use-After-Free.html title Adobe Reader ToolButton Use After Free data source https://packetstormsecurity.com/files/download/124463/windows-fileformat-adobe_toolbutton.rb.txt id PACKETSTORM:124463 last seen 2016-12-05 published 2013-12-17 reporter Soroush Dalili source https://packetstormsecurity.com/files/124463/Adobe-Reader-ToolButton-Use-After-Free.html title Adobe Reader ToolButton Use After Free
Redhat
rpms |
|
Seebug
bulletinFamily | exploit |
description | CVE ID:CVE-2013-3346 Adobe Reader和Acrobat中存在安全漏洞。攻击者可利用该漏洞执行任意代码或造成拒绝服务(内存损坏)。 0 Adobe Reader和Acrobat 9.5.5之前的9.x版本,10.1.7之前的10.x版本,11.0.03之前的11.x版本 厂商补丁: Adobe ----- 目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载: http://www.adobe.com/support/security/bulletins/apsb13-15.html |
id | SSV:61170 |
last seen | 2017-11-19 |
modified | 2013-12-18 |
published | 2013-12-18 |
reporter | Root |
source | https://www.seebug.org/vuldb/ssvid-61170 |
title | Adobe Reader和Acrobat内存损坏漏洞 |
The Hacker News
id | THN:1EA4AB16D6C3A0518A078CC8C9304FA5 |
last seen | 2017-01-08 |
modified | 2013-11-29 |
published | 2013-11-29 |
reporter | Mohit Kumar |
source | http://thehackernews.com/2013/11/CVE-2013-5065-Windows-XP-Privilege-escalation-Zero-Day-exploit.html |
title | CVE-2013-5065: Microsoft Windows XP and Server 2003 Privilege escalation Zero-Day exploit discovered |
References
- http://www.adobe.com/support/security/bulletins/apsb13-15.html
- http://www.adobe.com/support/security/bulletins/apsb13-15.html
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19054
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19054