Adobe Reader attacks continue two years after patch

Share this article:

JavaScript-based attacks taking advantage of an Adobe Reader and Acrobat vulnerability patched in 2010 are continuing in waves, Symantec researchers said this week. The security bug relates to an invalid TIFF value that corrupts the image file format's parser, senior software engineer Jason Zhang said in a blog post. Symantec said its technology has blocked more than 10,000 malicious PDF file attempts over the past two weeks, with the largest campaign coming on Feb. 16, two years to the date after the flaw was patched. Users are advised to update their Reader and Acrobat software.

Share this article:

Sign up to our newsletters

More in News

Report: SQL injection a pervasive threat, behavioral analysis needed

Report: SQL injection a pervasive threat, behavioral analysis ...

Long lag times between detection and resolution and reliance on traditional methods impair an organization's ability to combat SQL injection attacks.

WhatsApp bug allows for interception of shared locations

Researchers identified a vulnerability in WhatsApp that could enable an attacker to intercept shared locations using a man-in-the-middle attack, or a rogue access point.

Google tweaks its terms of service for clarity on Gmail scanning

The company is currently dealing with a lawsuit that challenges its email scanning practices.