Members
  • Total Members: 14176
  • Latest: toxxxa
Stats
  • Total Posts: 43011
  • Total Topics: 16199
  • Online Today: 5628
  • Online Ever: 51419
  • (01. January 2010., 10:27:49)









Post reply

Name:
Email:
Subject:
Message icon:

Verification:
Type the letters shown in the picture
Listen to the letters / Request another image

Type the letters shown in the picture:
Second Anti-Bot trap, type or simply copy-paste below (only the red letters):www.scforum.info:

shortcuts: hit alt+s to submit/post or alt+p to preview


Topic Summary

Posted by: Samker
« on: 16. December 2009., 09:14:12 »



Adobe is investigating reports of unpatched flaws in its Reader and Acrobat software packages.

Zero-day bugs in Adobe Reader and Acrobat have reportedly been exploited by hackers to attack vulnerable systems, in a series of limited (presumably) targeted attacks since 11 December. Adobe Reader and Acrobat 9.2 or below are potentially vulnerable to attacks. Successful exploitation creates a means for hackers to inject hostile code onto vulnerable systems, security notification firm Secunia warns: http://secunia.com/advisories/37690

Adobe has posted a holding statement on its security blog, saying that it is investigating the flaw: http://blogs.adobe.com/psirt/2009/12/new_adobe_reader_and_acrobat_v.html
It's unclear when a patch might become available.

Shadowserver suggests disabling JavaScript as a workaround, pending the availability of a patch from Adobe: http://www.shadowserver.org/wiki/pmwiki.php/Calendar/20091214

The latest security problem for Adobe follows the release of a patch for Flash and AIR addressing a previously unpatched vulnerability, released last week. Adobe is planning to publish a patch for a zero-day flaw in Illustrator on 8 January.

The popularity of Adobe software has made it a favoured target for hacking attacks over recent months. Booby-trapped PDF files have become as commonplace as browser exploits in hacking attacks. Part of the problem for this may be that applying Adobe updates is fiddlier and more time consuming than applying Microsoft fixes or patching browser exploits. Vulnerable ActiveX components can easily get left behind during updates, for example.

(Register)
Enter your email address to receive daily email with 'SCforum.info - Samker's Computer Forum' newest content:

Terms of Use | Privacy Policy | Advertising