Executive Summary

Summary
Title Adobe Reader and Acrobat memory corruption vulnerabilities
Informations
Name VU#422807 First vendor Publication 2013-02-14
Vendor VU-CERT Last vendor Modification 2013-02-21
Severity (Vendor) N/A Revision M

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Cvss Base Score 9.3 Attack Range Network
Cvss Impact Score 10 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Vulnerability Note VU#422807

Adobe Reader and Acrobat memory corruption vulnerabilities

Original Release date: 14 Feb 2013 | Last revised: 21 Feb 2013

Overview

Adobe Reader and Acrobat 11.0.01 and earlier, 10.1.5 and earlier, and 9.5.3 and earlier contain memory corruption vulnerabilities.

Description

The Adobe security bulletinAPSB13-07 states:

    Adobe has released security updates for Adobe Reader and Acrobat XI (11.0.01 and earlier) for Windows and Macintosh, X (10.1.5 and earlier) for Windows and Macintosh, 9.5.3 and earlier 9.x versions for Windows and Macintosh, and Adobe Reader 9.5.3 and earlier 9.x versions for Linux. These updates address vulnerabilities that could cause a crash and potentially allow an attacker to take control of the affected system.


Additional details may be found in the full bulletin APSB13-07.

Impact

A remote attacker may be able to cause a denial of service or execute arbitrary code on the system in the context of the user running the Adobe product.

Solution

Apply an Update

The Adobe security bulletinAPSB13-07 states:

    Adobe Reader

    Users on Windows and Macintosh can utilize the product's update mechanism. The default configuration is set to run automatic update checks on a regular schedule. Update checks can be manually activated by choosing Help > Check for Updates.

    Adobe Reader users on Windows can also find the appropriate update here:
    http://www.adobe.com/support/downloads/product.jsp?product=10&platform=Windows

    Adobe Reader users on Macintosh can also find the appropriate update here:
    http://www.adobe.com/support/downloads/product.jsp?product=10&platform=Macintosh

    Adobe Reader users on Linux can find the appropriate update here: ftp://ftp.adobe.com/pub/adobe/reader/unix/9.x/

    Adobe Acrobat

    Users can utilize the product's update mechanism. The default configuration is set to run automatic update checks on a regular schedule. Update checks can be manually activated by choosing Help > Check for Updates.

    Acrobat Standard, Pro and Pro Extended users on Windows can also find the appropriate update here:
    http://www.adobe.com/support/downloads/product.jsp?product=1&platform=Windows

    Acrobat Pro users on Macintosh can also find the appropriate update here:
    http://www.adobe.com/support/downloads/product.jsp?product=1&platform=Macintosh

Please consider the following workarounds, if you are unable to apply the update.

Enable Protected View

Users of Adobe Reader XI and Acrobat XI for Windows can protect themselves from this exploit by enabling Protected View. To enable this setting, choose the "Files from potentially unsafe locations" option under the Edit > Preferences > Security (Enhanced) menu.

Disable Javascript

To disable Javascript in Adobe Reader and Acrobat, uncheck "Enable Acrobat JavaScript" under the Edit > Preferences > JavaScript menu.

Use the Microsoft Enhanced Mitigation Experience Toolkit

The Microsoft Enhanced Mitigation Experience Toolkit (EMET) can be used to help prevent exploitation of this vulnerability. CERT/CC has created a video tutorial for setting up EMET 3.0 on Windows 7. Note that platforms that do not support ASLR, such as Windows XP and Windows Server 2003, will not receive the same level of protection that modern Windows platforms will.

Enable DEP in Microsoft Windows

Consider enabling Data Execution Prevention (DEP) in supported versions of Windows. DEP should not be treated as a complete workaround, but it can mitigate the execution of attacker-supplied code in some cases. Microsoft has published detailed technical information about DEP in Security Research & Defense blog posts "Understanding DEP as a mitigation technology" part 1 and part 2. DEP should be used in conjunction with the application of patches or other mitigations described in this document.

Note that when relying on DEP for exploit mitigation, it is important to use a system that supports Address Space Layout Randomization (ASLR) as well. ASLR is not supported by Windows XP or Windows Server 2003 or earlier. ASLR was introduced with Microsoft Windows Vista and Windows Server 2008. Please see the Microsoft SRD blog entry: On the effectiveness of DEP and ASLR for more details.

Vendor Information (Learn More)

VendorStatusDate NotifiedDate Updated
AdobeAffected-14 Feb 2013
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

GroupScoreVector
Base9.3AV:N/AC:M/Au:N/C:C/I:C/A:C
Temporal8.8E:H/RL:W/RC:C
Environmental8.8CDP:MH/TD:H/CR:H/IR:H/AR:H

References

  • https://www.adobe.com/support/security/bulletins/apsb13-07.html
  • https://www.adobe.com/support/security/advisories/apsa13-02.html
  • https://www.adobe.com/devnet-docs/acrobatetk/tools/AppSec/protectedview.html
  • http://blogs.mcafee.com/mcafee-labs/digging-into-the-sandbox-escape-technique-of-the-recent-pdf-exploit

Credit

This document was written by Jared Allar.

Other Information

  • CVE IDs:CVE-2013-0640CVE-2013-0641
  • Date Public:13 Feb 2013
  • Date First Published:14 Feb 2013
  • Date Last Updated:21 Feb 2013
  • Document Revision:13

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Original Source

Url : http://www.kb.cert.org/vuls/id/422807

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:16296
 
Oval ID: oval:org.mitre.oval:def:16296
Title: Unspecified vulnerability in Adobe Reader and Acrobat 9.x through 9.5.3, 10.x through 10.1.5, and 11.x through 11.0.1 allows remote attackers to execute arbitrary code via a crafted PDF document, as exploited in the wild in February 2013, a different vulnerability than CVE-2013-0641
Description: Buffer overflow in Adobe Reader and Acrobat 9.x before 9.5.4, 10.x before 10.1.6, and 11.x before 11.0.02 allows remote attackers to execute arbitrary code via a crafted PDF document, as exploited in the wild in February 2013.
Family: windows Class: vulnerability
Reference(s): CVE-2013-0641
Version: 7
Platform(s): Microsoft Windows 2000
Microsoft Windows 7
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Vista
Microsoft Windows XP
Microsoft Windows 8
Microsoft Windows Server 2012
Product(s): Adobe Reader
Adobe Acrobat
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:16406
 
Oval ID: oval:org.mitre.oval:def:16406
Title: Unspecified vulnerability in Adobe Reader and Acrobat 9.x through 9.5.3, 10.x through 10.1.5, and 11.x through 11.0.1 allows remote attackers to execute arbitrary code via a crafted PDF document, as exploited in the wild in February 2013, a different vulnerability than CVE-2013-0641
Description: Adobe Reader and Acrobat 9.x before 9.5.4, 10.x before 10.1.6, and 11.x before 11.0.02 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted PDF document, as exploited in the wild in February 2013.
Family: windows Class: vulnerability
Reference(s): CVE-2013-0640
Version: 7
Platform(s): Microsoft Windows 2000
Microsoft Windows 7
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Vista
Microsoft Windows XP
Microsoft Windows 8
Microsoft Windows Server 2012
Product(s): Adobe Reader
Adobe Acrobat
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:21027
 
Oval ID: oval:org.mitre.oval:def:21027
Title: RHSA-2013:0551: acroread security update (Critical)
Description: Buffer overflow in Adobe Reader and Acrobat 9.x before 9.5.4, 10.x before 10.1.6, and 11.x before 11.0.02 allows remote attackers to execute arbitrary code via a crafted PDF document, as exploited in the wild in February 2013.
Family: unix Class: patch
Reference(s): RHSA-2013:0551-02
CVE-2013-0640
CVE-2013-0641
Version: 33
Platform(s): Red Hat Enterprise Linux 6
Red Hat Enterprise Linux 5
Product(s): acroread
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:23915
 
Oval ID: oval:org.mitre.oval:def:23915
Title: ELSA-2013:0551: acroread security update (Critical)
Description: Buffer overflow in Adobe Reader and Acrobat 9.x before 9.5.4, 10.x before 10.1.6, and 11.x before 11.0.02 allows remote attackers to execute arbitrary code via a crafted PDF document, as exploited in the wild in February 2013.
Family: unix Class: patch
Reference(s): ELSA-2013:0551-02
CVE-2013-0640
CVE-2013-0641
Version: 13
Platform(s): Oracle Linux 6
Product(s): acroread
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:26112
 
Oval ID: oval:org.mitre.oval:def:26112
Title: SUSE-SU-2013:0349-1 -- Security update for acroread
Description: Acrobat Reader has been updated to 9.5.4 which fixes two critical security issues where attackers supplying PDFs could have caused code execution with acrobat. (CVE-2013-0640, CVE-2013-0641) More information can be found on: https://www.adobe.com/support/security/bulletins/apsb13-07.h tml <https://www.adobe.com/support/security/bulletins/apsb13-07. html>
Family: unix Class: patch
Reference(s): SUSE-SU-2013:0349-1
CVE-2013-0640
CVE-2013-0641
Version: 3
Platform(s): SUSE Linux Enterprise Desktop 11
SUSE Linux Enterprise Desktop 10
Product(s): acroread
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 52
Application 35

ExploitDB Exploits

id Description
2013-11-28 Adobe Acrobat Reader - ASLR/DEP Bypass Exploit with SANDBOX BYPASS

Snort® IPS/IDS

Date Description
2016-11-11 Adobe Acrobat Reader XFA app.setTimeOut memory corruption attempt
RuleID : 40431 - Revision : 3 - Type : FILE-PDF
2014-01-10 Adobe Acrobat Reader known malicious variable exploit attempt
RuleID : 28659 - Revision : 6 - Type : FILE-PDF
2014-01-10 Adobe Acrobat Reader XML Java used in app.setTimeOut
RuleID : 28658 - Revision : 6 - Type : FILE-PDF
2014-01-10 Adobe Acrobat Reader XFA app.setTimeOut memory corruption attempt
RuleID : 26021 - Revision : 13 - Type : FILE-PDF
2014-01-10 Adobe Acrobat Reader known malicious variable exploit attempt
RuleID : 25819 - Revision : 12 - Type : FILE-PDF
2014-01-10 Adobe Acrobat Reader known malicious variable exploit attempt
RuleID : 25818 - Revision : 12 - Type : FILE-PDF

Nessus® Vulnerability Scanner

Date Description
2014-06-13 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2013-151.nasl - Type : ACT_GATHER_INFO
2013-08-23 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201308-03.nasl - Type : ACT_GATHER_INFO
2013-02-27 Name : The remote SuSE 11 host is missing one or more security updates.
File : suse_11_acroread-130222.nasl - Type : ACT_GATHER_INFO
2013-02-27 Name : The remote SuSE 10 host is missing a security-related patch.
File : suse_acroread-8474.nasl - Type : ACT_GATHER_INFO
2013-02-22 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2013-0551.nasl - Type : ACT_GATHER_INFO
2013-02-21 Name : The version of Adobe Acrobat on the remote Windows host is affected by multip...
File : adobe_acrobat_apsb13-07.nasl - Type : ACT_GATHER_INFO
2013-02-21 Name : The version of Adobe Reader on the remote Windows host is affected by multipl...
File : adobe_reader_apsb13-07.nasl - Type : ACT_GATHER_INFO
2013-02-21 Name : The version of Adobe Reader on the remote Mac OS X host is affected by multip...
File : macosx_adobe_reader_apsb13-07.nasl - Type : ACT_GATHER_INFO
2002-11-28 Name : Arbitrary code can be executed on the remote host through the VM.
File : smb_nt_ms02-052.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
Date Informations
2015-04-18 13:27:05
  • Multiple Updates
2014-02-17 12:07:50
  • Multiple Updates
2013-02-21 21:19:56
  • Multiple Updates
2013-02-21 21:18:07
  • Multiple Updates
2013-02-14 21:22:43
  • Multiple Updates
2013-02-14 21:20:44
  • First insertion