Threat Management, Malware, Network Security, Vulnerability Management

Security beefed up in new Adobe Reader, Acrobat

Adobe this week released new versions of its flagship Reader and Acrobat products to include a number of new security capabilities.

Reader XI extends previously introduced sandbox "Protected View" controls -- in which PDFs are displayed in a confined environment to prevent malware from running elsewhere on the machine -- to now include "read-only" activities so hackers are unable to steal data via attacks, including so-called screen scrapes.

The new Reader and Acrobat editions also include a built-in security feature known as Address Space Layout Randomization, or ASLR. Introduced with the release of Windows Vista in early 2007, ASLR randomizes memory space and significantly lowers the chances for certain code execution attacks to succeed.

"Force ASLR improves the effectiveness of existing ASLR implementations by ensuring that all DLLs (dynamic-link libraries) loaded by Adobe Reader or Acrobat XI, including legacy DLLs without ASLR enabled, are randomized," Priyank Choudhury, a researcher with the Adobe Secure Software Engineering Team (ASSET), wrote in a Wednesday blog post. "By enabling Force ASLR in Adobe Reader and Acrobat XI, we are making it even more difficult for an attacker to exploit vulnerabilities."

The update also includes a new PDF Whitelisting Framework, which administrators can use to approve certain JavaScript running on PDF files or websites. In addition, the new versions offer support for elliptic curve cryptography (ECC) for digital signatures. ECC technology is generally considered a highly efficient form of public-key encryption.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms and Conditions and Privacy Policy.