|09 Sep 2010||#1|
| || |
Critical Adobe Reader Vulnerability Exploited in the Wild
Adobe warns that a new critical zero-day vulnerability affecting its Reader and Acrobat products is actively being exploited in the wild to compromise computers.
The company has published a Security Advisory about the flaw, identified as CVE-2010-2883 and for which public exploit code is available.
"A critical vulnerability exists in Adobe Reader 9.3.4 and earlier versions for Windows, Macintosh and UNIX, and Adobe Acrobat 9.3.4 and earlier versions for Windows and Macintosh.
"This vulnerability (CVE-2010-2883) could cause a crash and potentially allow an attacker to take control of the affected system. There are reports that this vulnerability is being actively exploited in the wild," Adobe writes.
There are no mitigation instructions available at the moment, but the company is working with security vendors to add detection for the exploit in their products. Therefore, users are strongly encouraged to keep their antivirus programs up to date.
Adobe thanks malware researcher Mila Parkour, who maintains the Contagio malware dump blog, for reporting the attack and working with its security team on the issue.
Critical Adobe Reader Vulnerability Exploited in the Wild - Softpedia
|My System Specs|
|09 Sep 2010||#3|
| || |
Adobe Reader 0day under active attack
Researchers have uncovered sophisticated attack code circulating on the net that exploits a critical vulnerability in the most recent version of Adobe Reader.
The click-and-get-hacked exploit spreads through email that contains a booby-trapped PDF file that remains virtually undetected by most anti-virus programs, according to Mila Parkour, the security researcher who first alerted Adobe to the threat. It was being sent to a small group of individuals who “work on common issues,” he said, causing him to believe they were narrowly selected by the attackers.
Adobe on Wednesday confirmed that the vulnerability affects Reader 9.3.4 and earlier versions for Windows, Mac OS X, and Unix. The company's security team is in the process of figuring out when it will release a patch. Adobe is working with security companies to help them develop detection and quarantine techniques to contain any attacks.
In the meantime, there are no mitigations users can take other than to exercise due care in opening PDF documents. It may also make sense to use an alternate PDF viewer such as FoxIT, but it's not yet been confirmed that that other programs aren't vulnerable.
The malicious PDF, which also exploits Adobe Acrobat, uses some highly sophisticated techniques to ensure success. It contains three separate font packages so it works on multiple versions of the Adobe programs, and it also has been designed to bypass protections such as ASLR, or address space layout randomization and DEP, and data execution prevention, which are built in to more recent versions of Microsoft Windows.
Engineers with the Metasploit framework are in the process of building a module that will make the exploit work with the open-source program for security professionals and hackers. An update could come as soon as Thursday, H D Moore, CSO of Rapid7 and chief architect of the Metasploit project, told The Register.
“It's a pretty complicated exploit and it's going to take a while to take apart,” he said.
The exploit comes as Adobe is putting the finishing touches on a security feature that's designed to significantly lessen the severity of attacks that exploit buffer overflows and other types of common bugs in Reader. The “sandbox” is intended to put a container around the application so that sensitive parts of the operating system can't be accessed by rogue code. Adobe has said it will be available by the end of this year.
Adobe Reader 0day under active attack â€˘ The Register
|My System Specs|
|09 Sep 2010||#7|
| || |
I've used Nitro too, but it's still in beta though, it has the new Ribbon UI that fits in with Office 2010 which is cool.
|My System Specs|
|Similar help and support threads for2: Critical Adobe Reader Vulnerability Exploited in the Wild|
|Critical Java zero-day bug is being “massively exploited in the wild”||Security News|
|Patch Schedule Announced for Actively Exploited Adobe Reader Vulner...||News|
|Report: Adobe Reader, IE top vulnerability list||System Security|
|Unpatched Windows Vulnerability Actively Exploited in the Wild||News|
|New 0-day vulnerability in Adobe´s Flash Player, Reader & Acrobat||System Security|
|Adobe Reader is world's most-exploited app.||Security News|
|Critical vulnerability found in Adobe Flash Player||News|
|Our Sites ||Site Links ||About Us ||Find Us |
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.
© Designer Media Ltd
All times are GMT -5. The time now is 11:46 PM.