Adobe to patch Reader zero-day this week with rush update
Hackers exploiting sandbox-bypass bug
Computerworld - Adobe on Saturday said it would release an emergency patch for two Reader zero-day vulnerabilities this week.
Hackers have already been exploiting the bugs using rigged PDF documents sent as email attachments.
"Adobe plans to make available updates for Adobe Reader and Acrobat ... during the week of February 18, 2013," the company said in its security incident response team's blog Saturday.
An associated security advisory, first issued last Wednesday, has also been updated to reflect the impending updates to Reader for Windows, OS X and Linux.
News of the Adobe Reader vulnerabilities surfaced Feb. 13 when researchers from security vendor FireEye reported that attackers were exploiting the bugs, which exist in the latest versions of the popular PDF-viewing software.
Adobe confirmed the vulnerabilities later that same day, acknowledging that attacks were sidestepping the anti-exploit "sandbox" defense baked into Reader 10 and Reader 11.
Some security experts concluded that the attacks are on the same level as the cyber-espionage Duqu threat of 2011, and claimed that that hints at a sophisticated operation beyond the skills of most hacker gangs.
Adobe will patch two vulnerabilities in its update this week; the pair have been used in combination by hackers to circumvent the sandbox and execute other malicious code.
In lieu of a patch, Adobe urged users to upgrade to Reader 11, then turn on "Protected View," an enhancement to the sandbox that adds additional defensive features. Adobe debuted its original "Protected Mode" sandbox with Reader 10 in November 2010. It added Protected View to Reader 11 last October.
Both Protected Mode and Protected View are available only in the Windows editions.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The Threat Landscape Hardly a day goes by without the discovery of a new cyberthreat somewhere in the world! But how do you keep up with...
- Security for Virtualization In the rush to implement virtualization, security has become second. So while the business benefits are clear, the risks are less well documented...
- Gartner 2013 Magic Quadrant for Enterprise Backup/Recovery Software See why CommVault was positioned as the #1 leader in Gartner's 2013 Magic Quadrant for Enterprise Backup/Recovery software for the 3rd year in...
- Forrester Report: CommVault is a Leader in Enterprise Backup and Recovery In this report, Forrester takes a deep dive into the evaluation criteria, how CommVault is positioned and the features and functionality that make...
- Four Myths of High-Productivity App Dev Debunked Debunk the main myths surrounding high-productivity application development and how both platforms have overcome them.
On-Demand Webcast: 7 Reasons to Choose VoIP
Thinking about a new phone system for your business?
Be sure to watch this informative webcast. Steve Strauss, small business columnist for USA...
All Malware and Vulnerabilities White Papers |