Post reply

Name:
Email:
Subject:
Message icon:

Verification:
Type the letters shown in the picture
Listen to the letters / Request another image

Type the letters shown in the picture:
Second Anti-Bot trap, type or simply copy-paste below (only the red letters):www.scforum.info:

shortcuts: hit alt+s to submit/post or alt+p to preview


Topic Summary

Posted by: georgecloner
« on: 11. March 2009., 12:17:17 »

As recommended by Adobe.com, AdobeReader 9.1 should replace old versions of adobe reader.

Adobe.com already released a new critical patch for the application.

Here's the link: http://www.adobe.com/support/security/bulletins/apsb09-03.html
Posted by: Samker
« on: 11. March 2009., 09:33:29 »

So still no patch from Adobe ? well, thats a good point for foxit reader !
Thanks


Yesterday, Pato provide us info. and links to latest Adobe updates:

http://scforum.info/index.php/topic,2366.0.html

Check them to be sure...

Posted by: haz
« on: 11. March 2009., 08:15:49 »

So still no patch from Adobe ? well, thats a good point for foxit reader !
Thanks
Posted by: georgecloner
« on: 11. March 2009., 04:31:37 »


US-CERT is aware of public reports of two new attack vectors for a vulnerability affecting Adobe Reader and Acrobat. This vulnerability is due to a buffer overflow condition that exists in the way Adobe Acrobat Reader handles JBIG2 Streams.

When Adobe Reader is installed on a system, it adds an IFilter that allows applications such as the Windows Indexing Service to index PDF files. If the Windows Indexing Service processes a malicious PDF file stored on the system, the vulnerability can be exploited. Exploitation using this technique can require little to no user interaction.

In addition to adding an IFilter, the Adobe Acrobat and Reader installation process adds a Windows Explorer Shell Extension. If Windows Explorer displays a folder that contains a malicious PDF file, the vulnerability can be exploited. Exploitation using this technique also requires little to no user interaction.

US-CERT encourages users and administrators to incorporate the following workarounds to help mitigate the risks:

    * Locate and unregister the Adobe Reader IFilter using: regsvr32 /u AcroRdIF.dll
    * Locate and unregister the Adobe Acrobat IFilter using: regsvr32 /u AcroIF.dll
    * Disable Adobe Acrobat Windows Shell integration to help mitigate the risk. This can be disabled by executing the following command: regsvr32 /u "%CommonProgramFiles%\Adobe\Acrobat\ActiveX\pdfshell.dll"

Additional information about the Adobe Reader and Acrobat JBIG2 vulnerability can be found in the Vulnerability Notes Database http://www.kb.cert.org/vuls/id/905281.

(US-CERT)
Enter your email address to receive daily email with 'SCforum.info - Samker's Computer Forum' newest content:

Terms of Use | Privacy Policy | Advertising