New
#1
I am glad I do not have Adobe Reader - and I don't want it!
More -
Adobe warns that a new critical zero-day vulnerability affecting its Reader and Acrobat products is actively being exploited in the wild to compromise computers.
The company has published a Security Advisory about the flaw, identified as CVE-2010-2883 and for which public exploit code is available.
"A critical vulnerability exists in Adobe Reader 9.3.4 and earlier versions for Windows, Macintosh and UNIX, and Adobe Acrobat 9.3.4 and earlier versions for Windows and Macintosh.
"This vulnerability (CVE-2010-2883) could cause a crash and potentially allow an attacker to take control of the affected system. There are reports that this vulnerability is being actively exploited in the wild," Adobe writes.
There are no mitigation instructions available at the moment, but the company is working with security vendors to add detection for the exploit in their products. Therefore, users are strongly encouraged to keep their antivirus programs up to date.
Adobe thanks malware researcher Mila Parkour, who maintains the Contagio malware dump blog, for reporting the attack and working with its security team on the issue.
Critical Adobe Reader Vulnerability Exploited in the Wild - Softpedia
More -Adobe Reader 0day under active attack
Researchers have uncovered sophisticated attack code circulating on the net that exploits a critical vulnerability in the most recent version of Adobe Reader.
The click-and-get-hacked exploit spreads through email that contains a booby-trapped PDF file that remains virtually undetected by most anti-virus programs, according to Mila Parkour, the security researcher who first alerted Adobe to the threat. It was being sent to a small group of individuals who “work on common issues,” he said, causing him to believe they were narrowly selected by the attackers.
Adobe on Wednesday confirmed that the vulnerability affects Reader 9.3.4 and earlier versions for Windows, Mac OS X, and Unix. The company's security team is in the process of figuring out when it will release a patch. Adobe is working with security companies to help them develop detection and quarantine techniques to contain any attacks.
In the meantime, there are no mitigations users can take other than to exercise due care in opening PDF documents. It may also make sense to use an alternate PDF viewer such as FoxIT, but it's not yet been confirmed that that other programs aren't vulnerable.
The malicious PDF, which also exploits Adobe Acrobat, uses some highly sophisticated techniques to ensure success. It contains three separate font packages so it works on multiple versions of the Adobe programs, and it also has been designed to bypass protections such as ASLR, or address space layout randomization and DEP, and data execution prevention, which are built in to more recent versions of Microsoft Windows.
Engineers with the Metasploit framework are in the process of building a module that will make the exploit work with the open-source program for security professionals and hackers. An update could come as soon as Thursday, H D Moore, CSO of Rapid7 and chief architect of the Metasploit project, told The Register.
“It's a pretty complicated exploit and it's going to take a while to take apart,” he said.
The exploit comes as Adobe is putting the finishing touches on a security feature that's designed to significantly lessen the severity of attacks that exploit buffer overflows and other types of common bugs in Reader. The “sandbox” is intended to put a container around the application so that sensitive parts of the operating system can't be accessed by rogue code. Adobe has said it will be available by the end of this year.
Adobe Reader 0day under active attack • The Register
I only use Foxit.
More recently though I don't have any PDF application installed, I like that Google Chrome (Version 6) has it's own built in now so I just use that if I need to view any PDF's these days :)
I used to use FoxIt but then switched to Nitro.
Nitro PDF Reader — The PDF Reader, Reimagined
Unfortunately, seems as soon as something becomes popular it becomes vulnerable.