Adobe to patch Reader zero-day this week with rush update
Hackers exploiting sandbox-bypass bug
Computerworld - Adobe on Saturday said it would release an emergency patch for two Reader zero-day vulnerabilities this week.
Hackers have already been exploiting the bugs using rigged PDF documents sent as email attachments.
"Adobe plans to make available updates for Adobe Reader and Acrobat ... during the week of February 18, 2013," the company said in its security incident response team's blog Saturday.
An associated security advisory, first issued last Wednesday, has also been updated to reflect the impending updates to Reader for Windows, OS X and Linux.
News of the Adobe Reader vulnerabilities surfaced Feb. 13 when researchers from security vendor FireEye reported that attackers were exploiting the bugs, which exist in the latest versions of the popular PDF-viewing software.
Adobe confirmed the vulnerabilities later that same day, acknowledging that attacks were sidestepping the anti-exploit "sandbox" defense baked into Reader 10 and Reader 11.
Some security experts concluded that the attacks are on the same level as the cyber-espionage Duqu threat of 2011, and claimed that that hints at a sophisticated operation beyond the skills of most hacker gangs.
Adobe will patch two vulnerabilities in its update this week; the pair have been used in combination by hackers to circumvent the sandbox and execute other malicious code.
In lieu of a patch, Adobe urged users to upgrade to Reader 11, then turn on "Protected View," an enhancement to the sandbox that adds additional defensive features. Adobe debuted its original "Protected Mode" sandbox with Reader 10 in November 2010. It added Protected View to Reader 11 last October.
Both Protected Mode and Protected View are available only in the Windows editions.
- Silicon Valley's 19 Coolest Places to Work
- Is Windows 8 Development Worth the Trouble?
- 8 Books Every IT Leader Should Read This Year
- 10 Hot Hadoop Startups to Watch
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- 2013 Cyber Risk Report The "Cyber risk report 2013 Executive summary" presents the major findings of HP Security Research's comprehensive dive into today's cyber vulnerability and threat...
- Why You Need a Next-Generation Firewall This white paper explores the reasons for implementing next-generation (NG) firewalls and lays out a path to success for overburdened IT organizations.
- Infographic: Converged Infrastructure Benefits This Infographic quantifies the savings organizations are realizing from increased deployment speed, higher availability, and lower annual costs.
- CIOs Deliver Productivity Breakthroughs with Intelligent Digital Signage Retailers have long recognized the influence that digital signage provides over a shopper's point-of-purchase decision making process.
- Top 4 Digital Signage Fails Join RMG Networks for a look at four of the most common reasons digital signage fails in corporate businesses. Learn about strategies to...
- Building Tomorrow's Infrastructure Listen to this podcast to discover how Crider Foods worked with PC Connection to update their IT infrastructure, while maintaining compliance and control. All Malware and Vulnerabilities White Papers | Webcasts