⚠ Actively exploited
Added to CISA KEV on 2022-03-28. Federal agencies required to patch by 2022-04-18. Required action: Apply updates per vendor instructions..

CVE-2013-2729Integer Overflow or Wraparound in Adobe Acrobat

Severity
10.0CRITICALNVD
NVD9.8VulnCheck9.8CISA9.8
EPSS
89.5%
top 0.44%
CISA KEV
KEV
Added 2022-03-28
Due 2022-04-18
Exploit
Exploited in wild
Active exploitation observed
Timeline
PublishedMay 16
KEV addedMar 28
KEV dueApr 18
Latest updateFeb 12
CISA Required Action: Apply updates per vendor instructions.

Description

Integer overflow in Adobe Reader and Acrobat 9.x before 9.5.5, 10.x before 10.1.7, and 11.x before 11.0.03 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2013-2727.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages6 packages

Also affects: Enterprise Linux 5.9, 6.4

Patches

🔴Vulnerability Details

5
GHSA
GHSA-h6q5-w33h-288x: Integer overflow in Adobe Reader and Acrobat 92022-05-17
GHSA
GHSA-q39j-xwr5-2ggj: Integer overflow in Adobe Reader and Acrobat 92022-05-17
CVEList
CVE-2013-2729: Integer overflow in Adobe Reader and Acrobat 92013-05-16
CVEList
CVE-2013-2727: Integer overflow in Adobe Reader and Acrobat 92013-05-16
VulnCheck
Adobe Reader and Acrobat Arbitrary Integer Overflow Vulnerability2013

💥Exploits & PoCs

1
Exploit-DB
Adobe Reader X 10.1.4.38 - '.BMP'/'.RLE' Heap Corruption2013-07-08

📋Vendor Advisories

3
CISA
Adobe Reader and Acrobat Arbitrary Integer Overflow Vulnerability2022-03-28
Red Hat
acroread: multiple code execution flaws (APSB13-15)2013-05-14
Red Hat
acroread: multiple code execution flaws (APSB13-15)2013-05-14

🕵️Threat Intelligence

5
Qualys
US-CERT: Top 30 Vulnerabilities | Qualys2015-05-01
Unit42
Tracking New Ransomware CryptoWall 2.02014-10-22
Unit42
Tracking New Ransomware CryptoWall 2.02014-10-22
Talos
Snowshoe Spam Attack Comes and Goes in a Flurry2014-08-20
Zscaler
Spearphishing Connects PCs To Russian Botnet | Zscaler2014-05-16

📄Research Papers

4
arXiv
Investigation of Advanced Persistent Threats Network-based Tactics, Techniques and Procedures2025-02-12
arXiv
Rethinking Misalignment to Raise the Bar for Heap Pointer Corruption2018-08-08
arXiv
Digital Investigation of PDF Files: Unveiling Traces of Embedded Malware2017-07-17
arXiv
Technical Aspects of Cyber Kill Chain2016-06-10

💬Community

1
Bugzilla
acroread: multiple code execution flaws (APSB13-15)2013-05-14
CVE-2013-2729 — Integer Overflow or Wraparound in Adobe | cvebase