Patch/Configuration Management, Vulnerability Management

Researchers expect widespread exploit of Adobe PDF flaw

Attackers are actively exploiting a gaping zero-day hole in versions 9 and earlier of Adobe Acrobat and Reader, the company has warned.

Adobe said Thursday that successful exploitation of the buffer overflowflaw could cause the application to crash and permit and attacker totake control of an affected system. The company said it plans to issuea patch by March 11 for version 9, and updates for versions 7 and 8 arescheduled to arrive soon after.

Researcher Steven Adair of the Shadowserver Foundation, a volunteer internet watchdog, recently tested a sample of the malicious PDF and determined that it relies on JavaScript for execution, according to a blog post he wrote Thursday.

Businesses can avoid infection by disabling JavaScript in Acrobat and Reader products, he said. Regardless, the exploit is likely to spread quickly.

"Right now, we believe these files are only being used in a smaller set of targeted attacks," Adair wrote. "However, these types of attacks are frequently the most damaging and it is only a matter of time before this exploit ends up in every exploit pack on the internet."

Shadowserver founder and director André De Mino told SCMagazineUS.com on Friday that users often are easily tricked into opening PDF files.

"People usually trust them," he said. "So certainly with JavaScript enabled in Acrobat, you can accomplish a lot of exploits."

Adobe said it is working with the major anti-virus providers so they can provide updated signatures for their customers.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms and Conditions and Privacy Policy.