Adobe confirms Flash zero-day bug in PDF docs
Hackers exploiting flaw already in the wild, says iDefense
Computerworld - Adobe is investigating a critical vulnerability in its Flash format that is currently being exploited by hackers using malicious PDF documents, according to the company's security team and outside researchers.
Adobe said little in a short entry to its security blog late Tuesday. "Adobe is aware of reports of a potential vulnerability in Adobe Reader and Acrobat 9.1.2 and Adobe Flash Player 9 and 10," said Brad Arkin, the company's director for product security and privacy. "We are currently investigating this potential issue."
Reader and Acrobat 9.1.2 are the most current versions of those applications.
An Adobe spokesman early Wednesday confirmed that the vulnerability was an issue within Flash content that is inserted into a PDF (Portable Document Format) file. Users can drop Flash movies into PDF files, for instance.
VeriSign's iDefense said it spotted an in-the-wild attack exploiting the Flash zero-day, according to a message posted to Twitter yesterday. "iDefense recently investigated a targeted attack using [an] embedded zero-day Flash exploit inside a PDF file," the security intelligence company said.
Adobe has had its share of security problems this year, particularly with Reader, the popular PDF viewer. In mid-March, for example, it plugged several holes in Reader, including one that had been exploited by hackers since early January. Then in both May and June it followed that with further fixes to quash another Reader zero-day and patch another 13 bugs in the viewer.
Security was also at issue this week when Danish bug tracker Secunia noticed that Adobe continues to provide an outdated edition of Reader for download. Yesterday, Adobe reacted to Secunia's report by saying it was reevaluating how its software updater operated.
iDefense did not immediately respond to a request for more information on its findings, while Adobe's spokesman said details of the Flash-PDF vulnerability would be posted on the company's security blog when they are available.
- IBM buys access control and identity management firm CrossIdeas
- Security Manager's Journal: A ransomware flop, thanks to security awareness
- In a hyper-social world, some seek a little privacy
- Popular Internet-of-Things devices aren't secure
- Many antivirus products are riddled with security flaws
- Mobile management: Making sense of your options
- British hacker Gary McKinnon launches SEO startup
- iPhone gets first free app for encrypting voice calls
- Zero-day flaws found in Symantec's Endpoint Protection
- BlackBerry plans to focus on security for the enterprise
Read more about Security in Computerworld's Security Topic Center.
- A Survival Guide for Data in the Wild All corporate data used to reside in the data center. Safe and sound behind the corporate firewall. But now, employees have multiple devices...
- Transforming Security: Designing a State-of-the-Art Extended Team The information security mission is no longer about implementing and operating controls.
- The Big Data Security Analytics Era Is Here New security risks and old security challenges often overwhelm legacy security controls and analytical tools.
- Building an Intelligence-Driven Security Operations Center The openness of today's networks and the growing sophistication of advanced threats make it almost impossible to prevent cyber attacks and intrusions.
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!