ID

VAR-201208-0212


CVE

CVE-2012-4363


TITLE

Adobe Reader Service disruption in ( Application crash ) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2012-003790

DESCRIPTION

Multiple unspecified vulnerabilities in Adobe Reader through 10.1.4 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF document, related to "sixteen more crashes affecting Windows, OS X, or both systems.". Adobe Acrobat and Reader are prone to multiple unspecified remote code-execution vulnerabilities. Successful attacks will result in arbitrary code execution in the context of the user running the affected application; failed attacks may cause denial-of-service conditions. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201308-03 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: High Title: Adobe Reader: Multiple vulnerabilities Date: August 22, 2013 Bugs: #431732, #451058, #469960 ID: 201308-03 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been found in Adobe Reader, including potential remote execution of arbitrary code and local privilege escalation. Background ========== Adobe Reader is a closed-source PDF reader. Please review the CVE identifiers referenced below for details. A local attacker could gain privileges via unspecified vectors. Workaround ========== There is no known workaround at this time. Resolution ========== All Adobe Reader users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=app-text/acroread-9.5.5" References ========== [ 1 ] CVE-2012-1525 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1525 [ 2 ] CVE-2012-1530 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1530 [ 3 ] CVE-2012-2049 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2049 [ 4 ] CVE-2012-2050 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2050 [ 5 ] CVE-2012-2051 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2051 [ 6 ] CVE-2012-4147 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4147 [ 7 ] CVE-2012-4148 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4748 [ 8 ] CVE-2012-4149 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4149 [ 9 ] CVE-2012-4150 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4150 [ 10 ] CVE-2012-4151 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4151 [ 11 ] CVE-2012-4152 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4152 [ 12 ] CVE-2012-4153 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4153 [ 13 ] CVE-2012-4154 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4154 [ 14 ] CVE-2012-4155 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4155 [ 15 ] CVE-2012-4156 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4156 [ 16 ] CVE-2012-4157 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4157 [ 17 ] CVE-2012-4158 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4158 [ 18 ] CVE-2012-4159 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4159 [ 19 ] CVE-2012-4160 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4160 [ 20 ] CVE-2012-4363 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4363 [ 21 ] CVE-2013-0601 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0601 [ 22 ] CVE-2013-0602 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0602 [ 23 ] CVE-2013-0603 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0603 [ 24 ] CVE-2013-0604 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0604 [ 25 ] CVE-2013-0605 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0605 [ 26 ] CVE-2013-0606 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0606 [ 27 ] CVE-2013-0607 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0607 [ 28 ] CVE-2013-0608 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0608 [ 29 ] CVE-2013-0609 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0609 [ 30 ] CVE-2013-0610 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0610 [ 31 ] CVE-2013-0611 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0611 [ 32 ] CVE-2013-0612 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0612 [ 33 ] CVE-2013-0613 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0613 [ 34 ] CVE-2013-0614 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0614 [ 35 ] CVE-2013-0615 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0615 [ 36 ] CVE-2013-0616 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0616 [ 37 ] CVE-2013-0617 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0617 [ 38 ] CVE-2013-0618 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0618 [ 39 ] CVE-2013-0619 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0619 [ 40 ] CVE-2013-0620 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0620 [ 41 ] CVE-2013-0621 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0621 [ 42 ] CVE-2013-0622 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0622 [ 43 ] CVE-2013-0623 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0623 [ 44 ] CVE-2013-0624 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0624 [ 45 ] CVE-2013-0626 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0626 [ 46 ] CVE-2013-0627 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0627 [ 47 ] CVE-2013-0640 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0640 [ 48 ] CVE-2013-0641 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0641 [ 49 ] CVE-2013-2549 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2549 [ 50 ] CVE-2013-2550 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2550 [ 51 ] CVE-2013-2718 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2718 [ 52 ] CVE-2013-2719 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2719 [ 53 ] CVE-2013-2720 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2720 [ 54 ] CVE-2013-2721 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2721 [ 55 ] CVE-2013-2722 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2722 [ 56 ] CVE-2013-2723 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2723 [ 57 ] CVE-2013-2724 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2724 [ 58 ] CVE-2013-2725 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2725 [ 59 ] CVE-2013-2726 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2726 [ 60 ] CVE-2013-2727 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2727 [ 61 ] CVE-2013-2729 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2729 [ 62 ] CVE-2013-2730 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2730 [ 63 ] CVE-2013-2731 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2731 [ 64 ] CVE-2013-2732 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2732 [ 65 ] CVE-2013-2733 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2733 [ 66 ] CVE-2013-2734 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2734 [ 67 ] CVE-2013-2735 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2735 [ 68 ] CVE-2013-2736 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2736 [ 69 ] CVE-2013-2737 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2737 [ 70 ] CVE-2013-3337 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3337 [ 71 ] CVE-2013-3338 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3338 [ 72 ] CVE-2013-3339 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3339 [ 73 ] CVE-2013-3340 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3340 [ 74 ] CVE-2013-3341 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3341 [ 75 ] CVE-2013-3342 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3342 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-201308-03.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2013 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5

Trust: 2.16

sources: NVD: CVE-2012-4363 // JVNDB: JVNDB-2012-003790 // BID: 55055 // VULHUB: VHN-57644 // VULMON: CVE-2012-4363 // PACKETSTORM: 122930

AFFECTED PRODUCTS

vendor:adobemodel:acrobat readerscope:eqversion:10.1.2

Trust: 1.6

vendor:adobemodel:acrobat readerscope:eqversion:8.2.6

Trust: 1.6

vendor:adobemodel:acrobat readerscope:eqversion:4.0.5a

Trust: 1.6

vendor:adobemodel:acrobat readerscope:eqversion:4.0.5c

Trust: 1.6

vendor:adobemodel:acrobat readerscope:eqversion:10.1

Trust: 1.6

vendor:adobemodel:acrobat readerscope:eqversion:3.0

Trust: 1.6

vendor:adobemodel:acrobat readerscope:eqversion:10.1.1

Trust: 1.6

vendor:adobemodel:acrobat readerscope:eqversion:3.02

Trust: 1.6

vendor:adobemodel:acrobat readerscope:eqversion:8.1.4

Trust: 1.6

vendor:adobemodel:acrobat readerscope:eqversion:3.01

Trust: 1.6

vendor:adobemodel:acrobat readerscope:eqversion:8.2.3

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:9.1.2

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:8.1.5

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:9.3.3

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:8.1.1

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:9.2

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:9.4.1

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:8.2.4

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:8.0

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:9.4.3

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:9.4.7

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:5.0.11

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:4.0.5

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:9.3.1

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:9.3.4

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:6.0.4

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.0.8

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:5.0

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:5.0.7

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:9.3

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.0.1

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.0.2

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:9.5.2

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.0.9

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:9.5.1

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:8.1.2

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:5.0.10

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:6.0.1

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.0.3

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:8.2

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:9.4.2

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:5.1

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:6.0.3

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:9.4

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:5.0.9

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:4.5

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:5.0.6

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:9.4.5

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:10.1.3

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:8.1.6

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.0.7

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:8.3

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:9.3.2

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.0.6

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.0.4

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:9.1.3

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:9.4.4

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:6.0.2

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:8.1.3

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:5.0.5

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:8.2.1

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:8.2.2

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:6.0

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:9.4.6

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.0

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:9.1

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.0.5

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:9.0

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:9.5

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:8.1

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:4.0

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:10.1.4

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:8.1.7

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:9.1.1

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:7.1.0

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:6.0.5

Trust: 1.0

vendor:adobemodel:readerscope:lteversion:10.1.4

Trust: 0.8

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:10.1.3

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:10.1.2

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:10.1.1

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:9.4.7

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:9.4.6

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:9.5.1

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:9.5

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:9.4.5

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:9.4.4

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:9.4.3

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:9.4.2

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:9.4.1

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:9.4

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:10.1

Trust: 0.3

vendor:adobemodel:acrobatscope:eqversion:10.1.3

Trust: 0.3

vendor:adobemodel:acrobatscope:eqversion:10.1.2

Trust: 0.3

vendor:adobemodel:acrobatscope:eqversion:10.1.1

Trust: 0.3

vendor:adobemodel:acrobatscope:eqversion:9.5.1

Trust: 0.3

vendor:adobemodel:acrobatscope:eqversion:9.5

Trust: 0.3

vendor:adobemodel:acrobatscope:eqversion:10.1

Trust: 0.3

vendor:adobemodel:acrobatscope:eqversion:10.0.3

Trust: 0.3

vendor:adobemodel:acrobatscope:eqversion:10.0.2

Trust: 0.3

vendor:adobemodel:acrobatscope:eqversion:10.0.1

Trust: 0.3

vendor:adobemodel:acrobatscope:eqversion:10.0

Trust: 0.3

sources: BID: 55055 // JVNDB: JVNDB-2012-003790 // CNNVD: CNNVD-201208-362 // NVD: CVE-2012-4363

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-4363
value: HIGH

Trust: 1.0

NVD: CVE-2012-4363
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201208-362
value: CRITICAL

Trust: 0.6

VULHUB: VHN-57644
value: HIGH

Trust: 0.1

VULMON: CVE-2012-4363
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2012-4363
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-57644
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-57644 // VULMON: CVE-2012-4363 // JVNDB: JVNDB-2012-003790 // CNNVD: CNNVD-201208-362 // NVD: CVE-2012-4363

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

sources: NVD: CVE-2012-4363

THREAT TYPE

remote

Trust: 1.2

sources: CNNVD: CNNVD-201208-305 // CNNVD: CNNVD-201208-362

TYPE

lack of information

Trust: 0.6

sources: CNNVD: CNNVD-201208-362

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-003790

PATCH

title:Top Pageurl:http://www.adobe.com/

Trust: 0.8

title:GLSA 201308-03url:http://www.gentoo.org/security/en/glsa/glsa-201308-03.xml

Trust: 0.8

title:Multiple Cryptographic Issues vulnerabilities in Rubyurl:https://blogs.oracle.com/sunsecurity/entry/multiple_cryptographic_issues_vulnerabilities_in

Trust: 0.8

title: - url:https://github.com/0xCyberY/CVE-T4PDF

Trust: 0.1

sources: VULMON: CVE-2012-4363 // JVNDB: JVNDB-2012-003790

EXTERNAL IDS

db:NVDid:CVE-2012-4363

Trust: 3.0

db:BIDid:55055

Trust: 1.0

db:JVNDBid:JVNDB-2012-003790

Trust: 0.8

db:CNNVDid:CNNVD-201208-362

Trust: 0.7

db:CNNVDid:CNNVD-201208-305

Trust: 0.6

db:VULHUBid:VHN-57644

Trust: 0.1

db:VULMONid:CVE-2012-4363

Trust: 0.1

db:PACKETSTORMid:122930

Trust: 0.1

sources: VULHUB: VHN-57644 // VULMON: CVE-2012-4363 // BID: 55055 // JVNDB: JVNDB-2012-003790 // PACKETSTORM: 122930 // CNNVD: CNNVD-201208-305 // CNNVD: CNNVD-201208-362 // NVD: CVE-2012-4363

REFERENCES

url:http://gynvael.coldwind.pl/?id=483

Trust: 2.6

url:http://j00ru.vexillium.org/?p=1175

Trust: 2.6

url:http://vexillium.org/dl.php?ar_callstack.txt

Trust: 1.8

url:http://security.gentoo.org/glsa/glsa-201308-03.xml

Trust: 1.3

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/78587

Trust: 1.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-4363

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-4363

Trust: 0.8

url:http://www.securityfocus.com/bid/55055

Trust: 0.6

url:http://www.adobe.com

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://github.com/0xcybery/cve-t4pdf

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-4363

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-4160

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-3338

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-4147

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-4155

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-4149

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0626

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4152

Trust: 0.1

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2729

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4160

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2718

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0605

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0611

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4159

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2719

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2722

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4147

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0624

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-4152

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2051

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0620

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2725

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0602

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2721

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0603

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-1525

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-4153

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0607

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0617

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-4151

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0615

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0605

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0601

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1525

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-3340

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2735

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0607

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0606

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0618

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2726

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2737

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4156

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2549

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4158

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4154

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4363

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2727

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0608

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0602

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4157

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-1530

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-4159

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0622

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2734

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-4157

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4153

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4150

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-3339

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-4156

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-3342

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0641

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2051

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0610

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2731

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0623

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2049

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4149

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2733

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2736

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4748

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-4748

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-4158

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-3337

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2050

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2720

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0606

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0614

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1530

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2730

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0616

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4151

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0608

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0619

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0627

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-4150

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-4154

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0603

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0609

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-3341

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0604

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2550

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0604

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0640

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4155

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2049

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2732

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2724

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0612

Trust: 0.1

url:http://security.gentoo.org/

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0613

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2723

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2050

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0621

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0601

Trust: 0.1

sources: VULHUB: VHN-57644 // VULMON: CVE-2012-4363 // BID: 55055 // JVNDB: JVNDB-2012-003790 // PACKETSTORM: 122930 // CNNVD: CNNVD-201208-305 // CNNVD: CNNVD-201208-362 // NVD: CVE-2012-4363

CREDITS

Mateusz ???j00ru??? Jurczyk and Gynvael Coldwind

Trust: 0.6

sources: CNNVD: CNNVD-201208-305

SOURCES

db:VULHUBid:VHN-57644
db:VULMONid:CVE-2012-4363
db:BIDid:55055
db:JVNDBid:JVNDB-2012-003790
db:PACKETSTORMid:122930
db:CNNVDid:CNNVD-201208-305
db:CNNVDid:CNNVD-201208-362
db:NVDid:CVE-2012-4363

LAST UPDATE DATE

2024-11-23T20:02:48.114000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-57644date:2017-08-29T00:00:00
db:VULMONid:CVE-2012-4363date:2017-08-29T00:00:00
db:BIDid:55055date:2013-08-26T08:09:00
db:JVNDBid:JVNDB-2012-003790date:2014-01-17T00:00:00
db:CNNVDid:CNNVD-201208-305date:2012-08-20T00:00:00
db:CNNVDid:CNNVD-201208-362date:2012-09-07T00:00:00
db:NVDid:CVE-2012-4363date:2024-11-21T01:42:45.573

SOURCES RELEASE DATE

db:VULHUBid:VHN-57644date:2012-08-21T00:00:00
db:VULMONid:CVE-2012-4363date:2012-08-21T00:00:00
db:BIDid:55055date:2012-08-16T00:00:00
db:JVNDBid:JVNDB-2012-003790date:2012-08-22T00:00:00
db:PACKETSTORMid:122930date:2013-08-23T06:29:02
db:CNNVDid:CNNVD-201208-305date:2012-08-20T00:00:00
db:CNNVDid:CNNVD-201208-362date:2012-08-22T00:00:00
db:NVDid:CVE-2012-4363date:2012-08-21T10:46:10.843