Adobe Promises Patch for Zero-Day Flaw in Acrobat, Reader

 
 
By Fahmida Y. Rashid  |  Posted 2011-12-06 Email Print this article Print
 
 
 
 
 
 
 

Adobe promised an out-of-band patch next week to fix a critical vulnerability in Adobe Acrobat and Reader. Attackers are already targeting Acrobat and Reader 9.x on Windows.

Adobe warned of a zero day vulnerability in Adobe Reader and Acrobat that is currently being exploited in the wild.

The new critical vulnerability in Adobe Reader and Adobe Acrobat could cause a crash and potentially allow an attacker to remotely take control of the compromised system, Adobe warned in a security advisory Dec. 6.

The vulnerability exists in Adobe Reader X and earlier versions for Windows and Macintosh, Adobe Reader 9.4.6 and earlier versions for Unix, and Adobe Acrobat X and earlier versions for Windows and Macintosh, Adobe said. Adobe Reader for Android and Adobe Flash Player are not affected by this issue.

The critical vulnerability is already being exploited in the wild in the form of targeted attacks against Windows users running Adobe Reader 9.x. Adobe has not received any reports of malicious PDFs being used to exploit other versions of Adobe Reader or Acrobat. The company declined to provide additional details of the current exploit.

Adobe is currently finalizing a fix for the issue and an out-of-band patch for Adobe Reader and Acrobat 9.x for Windows is expected "no later" than the week of Dec. 12, Adobe said. The protective sandbox technology in Reader X and Acrobat X would prevent the exploit from executing successfully, so those programs would be updated as part of the company's regularly scheduled quarterly security update, currently set for Jan. 10. Since the risk to Macintosh and Unix users was "significantly lower," these versions of affected software will also be patched during the quarterly update.

"The reason for addressing this issue quickly for Adobe Reader and Acrobat 9.4.6 for Windows is simple: This is the version and platform currently being targeted," Brad Arkin, senior director of product security and privacy at Adobe, wrote on the Adobe Secure Software Engineering Team blog.

The vulnerability was discovered and reported by Lockheed Martin Computer Incident Response Team and the Defense Security Information Exchange. The U3D memory corruption flaw could cause the compromised computer to crash and allow a remote attacker to seize control, according to the advisory.

The Adobe team is focusing the out-of-band patch to just Adobe Reader and Acrobat 9.x for Windows in order to ship it as soon as possible. This way, administrators would have the time to deploy the update before users and staff take time off for the upcoming holidays, Arkin said.

The advisory comes at an unfortunate time, as there is currently a spam campaign underway posing as upgrades for Acrobat and Reader, according to Graham Cluley, senior technology consultant at Sophos. The spam messages pretend to come from Adobe and have a ZIP file containing a version of the Zeus Trojan attached.

"Less technical-savvy computer users might believe the email is legitimate, and be tricked into installing malware onto their computer thinking that it is an official Adobe update," Cluley wrote on the Naked Security blog.

This is the first zero-day vulnerability found in Acrobat and Reader that is unrelated to a Flash Player flaw since Sept. 2010, Adobe noted.

 
 
 
 
 
 
 
 
 
 
 

Submit a Comment

Loading Comments...
 
Manage your Newsletters: Login   Register My Newsletters























 
 
 
 
 
 
 
 
 
 
 
Thanks for your registration, follow us on our social networks to keep up-to-date
Rocket Fuel