Adobe Reader zero-day exploit spotted in the wild
Posted on 13 February 2013.
Researchers form security firm FireEye have found in the wild a PDF file that exploits a new zero-day vulnerability in Adobe Reader.

"Upon successful exploitation, it will drop two DLLs. The first DLL shows a fake error message and opens a decoy PDF document, which is usually common in targeted attacks. The second DLL in turn drops the callback component, which talks to a remote domain," they explained, adding that they have already contacted Adobe about it.

Adobe has yet to confirm the finding, but they said that they were aware of the report of the vulnerability and that they are investigating it and assessing the risk to their customers.

According to FireEye, Adobe PDF Reader 9.5.3, 10.1.5, and 11.0.1 are affected by the flaw, and users should refrain from opening unknown PDF files until the vulnerability is patched, as well as disable the Adobe PDF plugin in the browser(s) they use.









Spotlight

More than a third of employees would sell company data

35 percent of employees would sell information on company patents, financial records and customer credit card details if the price was right. This illustrates the growing importance for organizations to deploy data loss prevention strategies.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Fri, Jul 31st
    COPYRIGHT 1998-2015 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //