Windows 7 Forums
Welcome to Windows 7 Forums. Our forum is dedicated to helping you find support and solutions for any problems regarding your Windows 7 PC be it Dell, HP, Acer, Asus or a custom build. We also provide an extensive Windows 7 tutorial section that covers a wide range of tips and tricks.



Windows 7: Critical Adobe Reader Vulnerability Exploited in the Wild

09 Sep 2010   #1
JMH

Win 7 Ultimate 64-bit. SP1.
 
 
Critical Adobe Reader Vulnerability Exploited in the Wild

Quote:

Adobe warns that a new critical zero-day vulnerability affecting its Reader and Acrobat products is actively being exploited in the wild to compromise computers.

The company has published a Security Advisory about the flaw, identified as CVE-2010-2883 and for which public exploit code is available.

"A critical vulnerability exists in Adobe Reader 9.3.4 and earlier versions for Windows, Macintosh and UNIX, and Adobe Acrobat 9.3.4 and earlier versions for Windows and Macintosh.

"This vulnerability (CVE-2010-2883) could cause a crash and potentially allow an attacker to take control of the affected system. There are reports that this vulnerability is being actively exploited in the wild," Adobe writes.

There are no mitigation instructions available at the moment, but the company is working with security vendors to add detection for the exploit in their products. Therefore, users are strongly encouraged to keep their antivirus programs up to date.

Adobe thanks malware researcher Mila Parkour, who maintains the Contagio malware dump blog, for reporting the attack and working with its security team on the issue.
More -
Critical Adobe Reader Vulnerability Exploited in the Wild - Softpedia

My System SpecsSystem Spec
.

09 Sep 2010   #2

Windows 7 Ultimate 32 bit
 
 

I am glad I do not have Adobe Reader - and I don't want it!
My System SpecsSystem Spec
09 Sep 2010   #3
JMH

Win 7 Ultimate 64-bit. SP1.
 
 

Quote:
Adobe Reader 0day under active attack

Researchers have uncovered sophisticated attack code circulating on the net that exploits a critical vulnerability in the most recent version of Adobe Reader.

The click-and-get-hacked exploit spreads through email that contains a booby-trapped PDF file that remains virtually undetected by most anti-virus programs, according to Mila Parkour, the security researcher who first alerted Adobe to the threat. It was being sent to a small group of individuals who “work on common issues,” he said, causing him to believe they were narrowly selected by the attackers.

Adobe on Wednesday confirmed that the vulnerability affects Reader 9.3.4 and earlier versions for Windows, Mac OS X, and Unix. The company's security team is in the process of figuring out when it will release a patch. Adobe is working with security companies to help them develop detection and quarantine techniques to contain any attacks.

In the meantime, there are no mitigations users can take other than to exercise due care in opening PDF documents. It may also make sense to use an alternate PDF viewer such as FoxIT, but it's not yet been confirmed that that other programs aren't vulnerable.

The malicious PDF, which also exploits Adobe Acrobat, uses some highly sophisticated techniques to ensure success. It contains three separate font packages so it works on multiple versions of the Adobe programs, and it also has been designed to bypass protections such as ASLR, or address space layout randomization and DEP, and data execution prevention, which are built in to more recent versions of Microsoft Windows.

Engineers with the Metasploit framework are in the process of building a module that will make the exploit work with the open-source program for security professionals and hackers. An update could come as soon as Thursday, H D Moore, CSO of Rapid7 and chief architect of the Metasploit project, told The Register.

“It's a pretty complicated exploit and it's going to take a while to take apart,” he said.

The exploit comes as Adobe is putting the finishing touches on a security feature that's designed to significantly lessen the severity of attacks that exploit buffer overflows and other types of common bugs in Reader. The “sandbox” is intended to put a container around the application so that sensitive parts of the operating system can't be accessed by rogue code. Adobe has said it will be available by the end of this year.
More -
Adobe Reader 0day under active attack • The Register
My System SpecsSystem Spec
.


09 Sep 2010   #4

Windows 7 Ultimate x64 SP1
 
 

I only use Foxit.

More recently though I don't have any PDF application installed, I like that Google Chrome (Version 6) has it's own built in now so I just use that if I need to view any PDF's these days
My System SpecsSystem Spec
09 Sep 2010   #5

Windows 7 Ultimate 32 bit
 
 

Wow! No protection from it whatsoever - except avoid pdf files.
My System SpecsSystem Spec
09 Sep 2010   #6

Microsoft Community Contributor Award Recipient

Win 7 Pro 64-bit
 
 

I used to use FoxIt but then switched to Nitro.

Nitro PDF Reader — The PDF Reader, Reimagined

Unfortunately, seems as soon as something becomes popular it becomes vulnerable.
My System SpecsSystem Spec
09 Sep 2010   #7

Windows 7 Ultimate x64 SP1
 
 

Quote   Quote: Originally Posted by marsmimar View Post
I used to use FoxIt but then switched to Nitro.

Nitro PDF Reader — The PDF Reader, Reimagined

Unfortunately, seems as soon as something becomes popular it becomes vulnerable.
Yeah, very true

I've used Nitro too, but it's still in beta though, it has the new Ribbon UI that fits in with Office 2010 which is cool.
My System SpecsSystem Spec
Reply

 Critical Adobe Reader Vulnerability Exploited in the Wild





Thread Tools




Our Sites

Site Links

About Us

Find Us

Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd

All times are GMT -5. The time now is 05:25 AM.
Twitter Facebook Google+



Windows 7 Forums

Seven Forums Android App Seven Forums IOS App
  

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33