Tag Archive for: reader

IT’S GEEK TO ME: Adobe Reader can be used to spread malware – The Northwest Florida Daily News

IT’S GEEK TO ME: Adobe Reader can be used to spread malware  The Northwest Florida Daily News

Q: Have you heard anything about malware introduced in a fake Adobe Flash update and how to detect and remove it? Here’s an article discussing it: …

“malware news” – read more

PDF exploit built to combine zero-day Windows and Adobe Reader bugs

  1. PDF exploit built to combine zero-day Windows and Adobe Reader bugs  SC Magazine
  2. Shadowy Hackers Accidentally Reveal Two Zero-Days to Security Researchers  BleepingComputer
  3. Adobe Patches Zero-Day Vulnerability in Acrobat, Reader  Security Boulevard
  4. Full coverage

zero day exploit – read more

Blunder burns unicorn attack that exploited Windows and Reader

Enlarge (credit: Lisa Cooper / Flickr)

It’s not every day someone develops a malware attack that, with one click, exploits separate zero-day vulnerabilities in two widely different pieces of software. It’s even rarer that a careless mistake burns such a unicorn before it can be used. Researchers say that’s precisely happened to malicious PDF document designed to target unpatched vulnerabilities in both Adobe Reader and older versions of Microsoft Windows.

Modern applications typically contain “sandboxes” and other defenses that make it much harder for exploits to successfully execute malicious code on computers. When these protections work as intended, attacks that exploit buffer overflows and other common software vulnerabilities result in a simple application crash rather than a potentially catastrophic security event. The defenses require attackers to chain together two or more exploits: one executes malicious code, and a separate exploit allows the code to break out of the sandbox.

A security researcher from antivirus provider Eset recently found a PDF document that bypassed these protections when Reader ran on older Windows versions. It exploited a then-unpatched memory corruption vulnerability, known as a double free, in Reader that made it possible to gain a limited ability to read and write to memory. But to install programs, the PDF still needed a way to bypass the sandbox so that the code could run in more sensitive parts of the OS.

Read 6 remaining paragraphs | Comments

Biz & IT – Ars Technica

Two zero-day vulnerabilities disclosed after Foxit refuses to patch PDF Reader

Foxit thumb

Researchers have disclosed two zero-day vulnerabilities affecting Foxit’s PDF Reader after the vendor revealed it has no plans to fix the security flaws.

David Bisson reports.

Graham Cluley