Adobe confirms zero-day danger in Reader and Acrobat

Dec 07, 2011 by Nancy Owano report

(PhysOrg.com) -- Adobe on Tuesday issued a critical security advisory for Adobe Reader and Acrobat. A vulnerability was detected and confirmed in Adobe Reader X (10.1.1) and earlier versions for Windows and Macintosh, Adobe Reader 9.4.6 and earlier 9.x versions for UNIX, and Adobe Acrobat X (10.1.1) and earlier versions for Windows and Macintosh. Adobe said the flaw could cause a crash and allow an attacker to take control of the affected system.

The is being “actively exploited in limited, targeted attacks in the wild against Adobe Reader 9.x on ,” according to the Adobe statement. The goal by attackers is to infect computers with malware. Since it can lead to the execution of arbitrary code, Adobe is categorizing the vulnerability as critical.

Adobe says the flaw affects multiple operating systems and various versions of its software.
• Adobe Reader X (10.1.1) and earlier 10.x versions for Windows and Macintosh
• Adobe Reader 9.4.6 and earlier 9.x versions for Windows, Macintosh and
• Adobe Acrobat X (10.1.1) and earlier 10.x versions for Windows and Macintosh
• Adobe Acrobat 9.4.6 and earlier 9.x versions for Windows and

The Reader for Android and Adobe Flash player are not affected.

Lockheed Martin and members of the Defense Security Information Exchange discovered and reported the flaw to Adobe. Defense contractors are being targeted, suggest reports.

Adobe says it is working on the fix and plans to issue an update for Adobe Reader and Acrobat 9.x for Windows no later than the week of December 12. .Adobe will “address the issue” in .Adobe Reader X and Acrobat X for Windows with the next update for Adobe Reader and Acrobat, and earlier versions of the Mac, scheduled for January 10.

An update to address 9.x for UNIX is also planned for January 10.

Tracking the latest information on the Adobe incident can be done by accessing the blog at blogs.adobe.com/psirt.

Meanwhile, security vendors Sophos reported on Tuesday that more mischief is being added in the form of fake fixes that are pretending to be sent from Adobe. Sophos is warning the public to beware of the phony upgrade notifications. The emails carry a ZIP attachment which has a version of the Zeus Trojan designed to steal banking information. Samples seen so far by Sophos all carry malware in the file "Adobe Systems Software Critical Update Dec 2011.exe" contained within the ZIP.

Explore further: The new Candy Crush? Chinese language apps make learning a game

More information: nakedsecurity.sophos.com/2011/… on-malware-attached/

Related Stories

Adobe cutting 680 jobs

Nov 10, 2009

Adobe Systems, known for its Photoshop editing program and Acrobat document software, announced on Tuesday it was cutting some 680 jobs worldwide, about nine percent of its workforce.

Adobe plugs Flash webcam spy hole

Oct 22, 2011

(PhysOrg.com) -- Adobe engineers on Thursday fixed a vulnerability in its Flash software that could enable attackers to use a person’s computer webcam or microphone feeds for spying on the person. Adobe made changes ...

Adobe pulls plug on Flash for mobile

Nov 09, 2011

US software maker Adobe pulled the plug Wednesday on its Flash player for mobile browsers, which Apple's late chief executive Steve Jobs refused to allow on the iPhone and iPad.

Adobe CS3: What You Get

Apr 27, 2007

Which bundle is right for you? We break down some of their key new tools, suite by suite.

Recommended for you

New app first to use gesture for language learning

16 hours ago

While you might think a person shaking her phone or tablet from side to side is having issues with the device, she might actually be playing a game that has her mimicking a steering wheel motion as part of ...

Linux distrib vendors make patches available for GHOST

Jan 29, 2015

Qualys said on Tuesday that there was a serious weakness in the Linux glibc library. During a code audit, Qualys researchers discovered a buffer overflow in the __nss_hostname_digits_dots() function of glibc. ...

User comments : 0

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.