Adobe confirms zero-day danger in Reader and Acrobat

Dec 07, 2011 by Nancy Owano report

(PhysOrg.com) -- Adobe on Tuesday issued a critical security advisory for Adobe Reader and Acrobat. A vulnerability was detected and confirmed in Adobe Reader X (10.1.1) and earlier versions for Windows and Macintosh, Adobe Reader 9.4.6 and earlier 9.x versions for UNIX, and Adobe Acrobat X (10.1.1) and earlier versions for Windows and Macintosh. Adobe said the flaw could cause a crash and allow an attacker to take control of the affected system.

The is being “actively exploited in limited, targeted attacks in the wild against Adobe Reader 9.x on ,” according to the Adobe statement. The goal by attackers is to infect computers with malware. Since it can lead to the execution of arbitrary code, Adobe is categorizing the vulnerability as critical.

Adobe says the flaw affects multiple operating systems and various versions of its software.
• Adobe Reader X (10.1.1) and earlier 10.x versions for Windows and Macintosh
• Adobe Reader 9.4.6 and earlier 9.x versions for Windows, Macintosh and
• Adobe Acrobat X (10.1.1) and earlier 10.x versions for Windows and Macintosh
• Adobe Acrobat 9.4.6 and earlier 9.x versions for Windows and

The Reader for Android and Adobe Flash player are not affected.

Lockheed Martin and members of the Defense Security Information Exchange discovered and reported the flaw to Adobe. Defense contractors are being targeted, suggest reports.

Adobe says it is working on the fix and plans to issue an update for Adobe Reader and Acrobat 9.x for Windows no later than the week of December 12. .Adobe will “address the issue” in .Adobe Reader X and Acrobat X for Windows with the next update for Adobe Reader and Acrobat, and earlier versions of the Mac, scheduled for January 10.

An update to address 9.x for UNIX is also planned for January 10.

Tracking the latest information on the Adobe incident can be done by accessing the blog at blogs.adobe.com/psirt.

Meanwhile, security vendors Sophos reported on Tuesday that more mischief is being added in the form of fake fixes that are pretending to be sent from Adobe. Sophos is warning the public to beware of the phony upgrade notifications. The emails carry a ZIP attachment which has a version of the Zeus Trojan designed to steal banking information. Samples seen so far by Sophos all carry malware in the file "Adobe Systems Software Critical Update Dec 2011.exe" contained within the ZIP.

Explore further: 'Halo' makers shed light on live-action series

More information: nakedsecurity.sophos.com/2011/… on-malware-attached/

Related Stories

Adobe cutting 680 jobs

Nov 10, 2009

Adobe Systems, known for its Photoshop editing program and Acrobat document software, announced on Tuesday it was cutting some 680 jobs worldwide, about nine percent of its workforce.

Adobe plugs Flash webcam spy hole

Oct 22, 2011

(PhysOrg.com) -- Adobe engineers on Thursday fixed a vulnerability in its Flash software that could enable attackers to use a person’s computer webcam or microphone feeds for spying on the person. Adobe made changes ...

Adobe pulls plug on Flash for mobile

Nov 09, 2011

US software maker Adobe pulled the plug Wednesday on its Flash player for mobile browsers, which Apple's late chief executive Steve Jobs refused to allow on the iPhone and iPad.

Adobe CS3: What You Get

Apr 27, 2007

Which bundle is right for you? We break down some of their key new tools, suite by suite.

Recommended for you

Watching others play video games is the new spectator sport

Aug 29, 2014

As the UK's largest gaming festival, Insomnia, wrapped up its latest event on August 25, I watched a short piece of BBC Breakfast news reporting from the festival. The reporter and some of the interviewees appeared baff ...

SHORE facial analysis spots emotions on Google Glass

Aug 28, 2014

One of the key concerns about facial recognition software has been over privacy. The very idea of having tracking mechanisms as part of an Internet-connected wearable would be likely to upset many privacy ...

User comments : 0