Lucene search

K
cve[email protected]CVE-2011-2433
HistorySep 15, 2011 - 12:26 p.m.

CVE-2011-2433

2011-09-1512:26:49
CWE-119
web.nvd.nist.gov
44
cve
adobe reader
acrobat
buffer overflow
arbitrary code execution
nvd

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

7.7 High

AI Score

Confidence

Low

0.354 Low

EPSS

Percentile

97.2%

Heap-based buffer overflow in Adobe Reader and Acrobat 8.x before 8.3.1, 9.x before 9.4.6, and 10.x before 10.1.1 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2011-2434 and CVE-2011-2437.

Affected configurations

NVD
Node
adobeacrobat_readerMatch8.0
OR
adobeacrobat_readerMatch8.1
OR
adobeacrobat_readerMatch8.1.1
OR
adobeacrobat_readerMatch8.1.2
OR
adobeacrobat_readerMatch8.1.3
OR
adobeacrobat_readerMatch8.1.4
OR
adobeacrobat_readerMatch8.1.5
OR
adobeacrobat_readerMatch8.1.6
OR
adobeacrobat_readerMatch8.1.7
OR
adobeacrobat_readerMatch8.2
OR
adobeacrobat_readerMatch8.2.1
OR
adobeacrobat_readerMatch8.2.2
OR
adobeacrobat_readerMatch8.2.3
OR
adobeacrobat_readerMatch8.2.4
OR
adobeacrobat_readerMatch8.2.6
OR
adobeacrobat_readerMatch8.3
OR
adobeacrobat_readerMatch9.0
OR
adobeacrobat_readerMatch9.1
OR
adobeacrobat_readerMatch9.1.1
OR
adobeacrobat_readerMatch9.1.2
OR
adobeacrobat_readerMatch9.1.3
OR
adobeacrobat_readerMatch9.2
OR
adobeacrobat_readerMatch9.3
OR
adobeacrobat_readerMatch9.3.1
OR
adobeacrobat_readerMatch9.3.2
OR
adobeacrobat_readerMatch9.3.3
OR
adobeacrobat_readerMatch9.3.4
OR
adobeacrobat_readerMatch9.4
OR
adobeacrobat_readerMatch9.4.1
OR
adobeacrobat_readerMatch9.4.2
OR
adobeacrobat_readerMatch9.4.3
OR
adobeacrobat_readerMatch9.4.4
OR
adobeacrobat_readerMatch10.0
OR
adobeacrobat_readerMatch10.0.1
OR
adobeacrobat_readerMatch10.0.2
OR
adobeacrobat_readerMatch10.0.3
Node
adobeacrobatMatch8.0
OR
adobeacrobatMatch8.1
OR
adobeacrobatMatch8.1.1
OR
adobeacrobatMatch8.1.2
OR
adobeacrobatMatch8.1.3
OR
adobeacrobatMatch8.1.4
OR
adobeacrobatMatch8.1.5
OR
adobeacrobatMatch8.1.6
OR
adobeacrobatMatch8.1.7
OR
adobeacrobatMatch8.2
OR
adobeacrobatMatch8.2.1
OR
adobeacrobatMatch8.2.2
OR
adobeacrobatMatch8.2.3
OR
adobeacrobatMatch8.2.4
OR
adobeacrobatMatch8.2.5
OR
adobeacrobatMatch8.2.6
OR
adobeacrobatMatch9.0
OR
adobeacrobatMatch9.1
OR
adobeacrobatMatch9.1.1
OR
adobeacrobatMatch9.1.2
OR
adobeacrobatMatch9.1.3
OR
adobeacrobatMatch9.2
OR
adobeacrobatMatch9.3
OR
adobeacrobatMatch9.3.1
OR
adobeacrobatMatch9.3.2
OR
adobeacrobatMatch9.3.3
OR
adobeacrobatMatch9.3.4
OR
adobeacrobatMatch9.4
OR
adobeacrobatMatch9.4.1
OR
adobeacrobatMatch9.4.2
OR
adobeacrobatMatch9.4.3
OR
adobeacrobatMatch9.4.4
OR
adobeacrobatMatch9.4.5
OR
adobeacrobatMatch10.0
OR
adobeacrobatMatch10.0.1
OR
adobeacrobatMatch10.0.2
OR
adobeacrobatMatch10.0.3
OR
adobeacrobatMatch10.1

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

7.7 High

AI Score

Confidence

Low

0.354 Low

EPSS

Percentile

97.2%