Adobe confirms PDF zero-day, plans rush patch
Will go 'out-of-band' with fix, probably on Aug. 17
Computerworld - Adobe today said it would issue an emergency patch the week of Aug. 16 to fix a critical flaw in its Reader and Acrobat software.
The bug was disclosed by researcher Charlie Miller at last month's Black Hat security conference when he demonstrated how the open-source BitBlaze toolkit could be used to boost bug-hunting productivity 10-fold.
Miller, an analyst with Baltimore-based Independent Security Evaluators, is well-known for finding vulnerabilities in Adobe's popular Reader PDF viewer. Last March, Miller showed how a simple fuzzing tool could root out scores of potential bugs in Reader, Microsoft Office, Apple's Preview and other software.
According to a paper Miller published after the Black Hat conference (download PDF), and others, the bug is in Reader's and Acrobat's font parsing.
"This can be exploited to corrupt memory via a PDF file containing a specially-crafted TrueType font," stated Danish vulnerability tracker Secunia in an advisory published Wednesday. "Successful exploitation may allow execution of arbitrary code."
Today, Adobe announced it would release a rush, or "out-of-band" security update during the week of Aug. 16-20. Adobe issues its quarterly security updates for Reader and Acrobat on Tuesdays, and has shipped emergency fixes on that same day of the week. If the company continues the practice, it would most likely deliver the out-of-band patch on Aug. 17.
Adobe hinted that the out-of-band update will include fixes for vulnerabilities other than the one Miller uncovered. The company also said it would still ship its next regularly-scheduled quarterly update on Oct. 12.
Although the Adobe vulnerability shares traits with the one currently being used to "jailbreak" Apple's iOS mobile operating system -- both involve font parsing errors -- they're not linked, Miller said.
"Its just a coincidence that they are both bugs in the way programs parse fonts in PDFs," Miller said in an e-mail reply to questions.
The vulnerability exploited by the JailbreakMe software is in Apple's PDF viewer, dubbed Preview, not in Adobe's Reader, a fact that Adobe tried to make clear yesterday. "Not all PDF-related vulnerabilities are automatically Adobe vulnerabilities," argued Brad Arkin, Adobe's head of security and privacy, pointing out that the formerly proprietary PDF was issued as an open standard in 2008.
Adobe has issued several out-of-band updates this year for Reader. Adobe last released an emergency Reader update in late June when it moved up the already-scheduled July 13 fixes by two weeks to deal with a bug hackers were already exploiting. It also rushed a Reader fix to customers in February.
The push to come up with a fix for the latest Reader zero-day will not affect work on the next major upgrade to the program, Adobe said today. Reader 10, which should ship for Windows before the end of the year, is to include "sandboxing" technology to isolate malicious PDF documents -- such as the kind that might leverage Miller's vulnerability -- so that they can't infect the PC.
Gregg Keizer covers Microsoft, security issues, Apple, Web browsers and general technology breaking news for Computerworld. Follow Gregg on Twitter at @gkeizer or subscribe to Gregg's RSS feed . His e-mail address is email@example.com.
Read more about Security in Computerworld's Security Topic Center.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts