Critical Adobe Reader Vulnerability Exploited in the Wild

    Critical Adobe Reader Vulnerability Exploited in the Wild


    Posted: 09 Sep 2010

    Adobe warns that a new critical zero-day vulnerability affecting its Reader and Acrobat products is actively being exploited in the wild to compromise computers.

    The company has published a Security Advisory about the flaw, identified as CVE-2010-2883 and for which public exploit code is available.

    "A critical vulnerability exists in Adobe Reader 9.3.4 and earlier versions for Windows, Macintosh and UNIX, and Adobe Acrobat 9.3.4 and earlier versions for Windows and Macintosh.

    "This vulnerability (CVE-2010-2883) could cause a crash and potentially allow an attacker to take control of the affected system. There are reports that this vulnerability is being actively exploited in the wild," Adobe writes.

    There are no mitigation instructions available at the moment, but the company is working with security vendors to add detection for the exploit in their products. Therefore, users are strongly encouraged to keep their antivirus programs up to date.

    Adobe thanks malware researcher Mila Parkour, who maintains the Contagio malware dump blog, for reporting the attack and working with its security team on the issue.
    More -
    Critical Adobe Reader Vulnerability Exploited in the Wild - Softpedia
    Posted By: JMH
    09 Sep 2010



  1. Posts : 11,990
    Windows 7 Ultimate 32 bit
       #1

    I am glad I do not have Adobe Reader - and I don't want it!
      My Computer


  2. JMH
    Posts : 7,952
    Win 7 Ultimate 64-bit. SP1.
    Thread Starter
       #2

    Adobe Reader 0day under active attack

    Researchers have uncovered sophisticated attack code circulating on the net that exploits a critical vulnerability in the most recent version of Adobe Reader.

    The click-and-get-hacked exploit spreads through email that contains a booby-trapped PDF file that remains virtually undetected by most anti-virus programs, according to Mila Parkour, the security researcher who first alerted Adobe to the threat. It was being sent to a small group of individuals who “work on common issues,” he said, causing him to believe they were narrowly selected by the attackers.

    Adobe on Wednesday confirmed that the vulnerability affects Reader 9.3.4 and earlier versions for Windows, Mac OS X, and Unix. The company's security team is in the process of figuring out when it will release a patch. Adobe is working with security companies to help them develop detection and quarantine techniques to contain any attacks.

    In the meantime, there are no mitigations users can take other than to exercise due care in opening PDF documents. It may also make sense to use an alternate PDF viewer such as FoxIT, but it's not yet been confirmed that that other programs aren't vulnerable.

    The malicious PDF, which also exploits Adobe Acrobat, uses some highly sophisticated techniques to ensure success. It contains three separate font packages so it works on multiple versions of the Adobe programs, and it also has been designed to bypass protections such as ASLR, or address space layout randomization and DEP, and data execution prevention, which are built in to more recent versions of Microsoft Windows.

    Engineers with the Metasploit framework are in the process of building a module that will make the exploit work with the open-source program for security professionals and hackers. An update could come as soon as Thursday, H D Moore, CSO of Rapid7 and chief architect of the Metasploit project, told The Register.

    “It's a pretty complicated exploit and it's going to take a while to take apart,” he said.

    The exploit comes as Adobe is putting the finishing touches on a security feature that's designed to significantly lessen the severity of attacks that exploit buffer overflows and other types of common bugs in Reader. The “sandbox” is intended to put a container around the application so that sensitive parts of the operating system can't be accessed by rogue code. Adobe has said it will be available by the end of this year.
    More -
    Adobe Reader 0day under active attack • The Register
      My Computer


  3. Posts : 195
    Windows 7 Ultimate x64 SP1
       #3

    I only use Foxit.

    More recently though I don't have any PDF application installed, I like that Google Chrome (Version 6) has it's own built in now so I just use that if I need to view any PDF's these days :)
      My Computer


  4. Posts : 11,990
    Windows 7 Ultimate 32 bit
       #4

    Wow! No protection from it whatsoever - except avoid pdf files.
      My Computer


  5. Posts : 10,994
    Win 7 Pro 64-bit
       #5

    I used to use FoxIt but then switched to Nitro.

    Nitro PDF Reader — The PDF Reader, Reimagined

    Unfortunately, seems as soon as something becomes popular it becomes vulnerable.
      My Computer


  6. Posts : 195
    Windows 7 Ultimate x64 SP1
       #6

    marsmimar said:
    I used to use FoxIt but then switched to Nitro.

    Nitro PDF Reader — The PDF Reader, Reimagined

    Unfortunately, seems as soon as something becomes popular it becomes vulnerable.
    Yeah, very true

    I've used Nitro too, but it's still in beta though, it has the new Ribbon UI that fits in with Office 2010 which is cool.
      My Computer


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 19:23.
Find Us