Adobe Reader zero-day exploit spotted in the wild
Posted on 13 February 2013.
Researchers form security firm FireEye have found in the wild a PDF file that exploits a new zero-day vulnerability in Adobe Reader.

"Upon successful exploitation, it will drop two DLLs. The first DLL shows a fake error message and opens a decoy PDF document, which is usually common in targeted attacks. The second DLL in turn drops the callback component, which talks to a remote domain," they explained, adding that they have already contacted Adobe about it.

Adobe has yet to confirm the finding, but they said that they were aware of the report of the vulnerability and that they are investigating it and assessing the risk to their customers.

According to FireEye, Adobe PDF Reader 9.5.3, 10.1.5, and 11.0.1 are affected by the flaw, and users should refrain from opening unknown PDF files until the vulnerability is patched, as well as disable the Adobe PDF plugin in the browser(s) they use.









Spotlight

How security analytics help identify and manage breaches

Posted on 30 July 2014.  |  Steve Dodson, CTO at Prelert, illustrates the importance of security analytics in today's complex security architectures, talks about the most significant challenges involved in getting usable information from massive data sets, and much more.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Thu, Jul 31st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //