Adobe confirms PDF tracking issue, plans to ship fix soon

Share this article:
Adobe confirms PDF tracking issue, plans to ship fix soon
Adobe confirms PDF tracking issue, plans to ship fix soon

Adobe has confirmed what it deems to be a "low-severity" issue in Reader and Acrobat that could allow someone to track a PDF document.

"A user's IP address and time stamp could be exposed when opening a specially crafted PDF," according to an Adobe Product Security Incident Response Team blog post published Thursday.

The company said the issue – Adobe did not classify it as a "vulnerability" – would be resolved May 14, the next scheduled update for the popular software.

A week ago, researchers at security firm McAfee disclosed the problem, which they considered a vulnerability.

The flaw, which is being exploited in the wild, affects all versions of Reader, including the most recent, 11.0.2. While the hole does not enable remote code execution – the most serious outcome a vulnerability can have – it can permit a sender "to see when and where the PDF is opened," McAfee researcher Haifei Li wrote in an April 26 blog post.

Li said McAfee is aware of the issue being actively leveraged. It has spotted a number of PDF samples sent by an email tracking service provider. Researchers, however, are unsure if this was done with malicious intentions, such as part of an advanced persistent threat (APT)-style attack.


Share this article:

Sign up to our newsletters

More in News

AOL Mail hack furthers spam campaign using spoofed accounts

AOL confirmed on Monday that it was aware of the issue and working to remediate the situation.

Backdoors in Wi-Fi routers, said to be closed, can be reopened

Backdoors in Wi-Fi routers, said to be closed, ...

Although said to be patched, researcher Eloi Vanderbeken discovered during the Easter holiday that backdoors existing in certain wireless routers can be reactivated.

Apple ships Mac OS X updates, fixes several code execution bugs

Apple ships Mac OS X updates, fixes several ...

Among the addressed vulnerabilities, was a bug affecting WindowServer, which could allow an attacker to execute malicious code outside the sandbox.