Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Security Management //

Patch Management

10/3/2018
01:00 PM
Scott Ferguson
Scott Ferguson
News Analysis-Security Now
50%
50%

Adobe, Foxit PDF Vulnerabilities Show Danger of Remote Code Execution

Within the last week, Adobe and Foxit each rolled out dozens of patches to their PDF products that specifically fixed issues that could lead to an attack using remote code execution.

It's not been a good week for PDFs and security.

In the span of seven days, Adobe and Foxit, a rival PDF provider, released dozens and dozens of security patches for their respective software. Several of these patches addressed vulnerabilities that could lead to an attack using remote code execution.

These types of vulnerabilities can allow attackers using remote code execution exploits to gain access to larger portions of an enterprise network -- an important concern for businesses, especially since PDF files and readers remain important to corporate work. By using code execution, an attacker could create a malicious PDF document that if opened, then would install malware on an endpoint device.

In addition, since many of these PDF tools (specifically Foxit) come with browser plugins, the person reading a document could trigger an attack by merely viewing the PDF file in the browser.

Foxit, which is seen as a cheaper alternative to the more expensive Adobe software, sent out a security notification on September 28 that patched more than 100 different vulnerabilities in its Reader 9.3 and Foxit PhantomPDF 9.3. Many of those patches fixed remote code vulnerabilities.

This massive security patch update came a few days before Cisco Talos published a blog post on October 1 that highlighted 18 of the vulnerabilities Foxit fixed.

At about the same time, Adobe sent out an October update for its popular Acrobat and Reader products, designed to address over 80 different vulnerabilities. Many of these were deemed critical and tackled remote code execution vulnerabilities.

Once again, Talos, along with several other security vendors, highlighted some of the vulnerabilities following the release of the patch.

What these updates show is the importance of patching software, especially applications that are used within enterprises every day. Timur Kovalev, CTO of San Jose-based network security provider Untangle, notes in an email that it only takes one vulnerability to compromise an entire network.

The Foxit vulnerabilities were especially troubling, Kovalev noted.

"It is critical for any person or business using the Foxit products to immediately upgrade to the newest version to ensure the vulnerabilities are patched. Browser plugins have led to hackers exploiting weaknesses in the past, so it is important users understand the risk of enabling plugins," Kovalev wrote in an email to Security Now.

"Always check the credentials of the software publisher, and ensure that unnecessary plugins are uninstalled. Hackers are always looking for the weakness in a product, network or device, so ensuring your systems are up-to-date and businesses are proactively protecting their employees and networks from the latest threats are crucial steps to stay one step ahead," he added.

Related posts:

— Scott Ferguson is the managing editor of Light Reading and the editor of Security Now. Follow him on Twitter @sferguson_LR.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/3/2020
'BootHole' Vulnerability Exposes Secure Boot Devices to Attack
Kelly Sheridan, Staff Editor, Dark Reading,  7/29/2020
Out-of-Date and Unsupported Cloud Workloads Continue as a Common Weakness
Robert Lemos, Contributing Writer,  7/28/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-16271
PUBLISHED: 2020-08-03
The SRP-6a implementation in Kee Vault KeePassRPC before 1.12.0 generates insufficiently random numbers, which allows remote attackers to read and modify data in the KeePass database via a WebSocket connection.
CVE-2020-16272
PUBLISHED: 2020-08-03
The SRP-6a implementation in Kee Vault KeePassRPC before 1.12.0 is missing validation for a client-provided parameter, which allows remote attackers to read and modify data in the KeePass database via an A=0 WebSocket connection.
CVE-2020-8574
PUBLISHED: 2020-08-03
Active IQ Unified Manager for Linux versions prior to 9.6 ship with the Java Management Extension Remote Method Invocation (JMX RMI) service enabled allowing unauthorized code execution to local users.
CVE-2020-8575
PUBLISHED: 2020-08-03
Active IQ Unified Manager for VMware vSphere and Windows versions prior to 9.5 are susceptible to a vulnerability which allows administrative users to cause Denial of Service (DoS).
CVE-2020-12739
PUBLISHED: 2020-08-03
A vulnerability in the Fanuc i Series CNC (0i-MD and 0i Mate-MD) could allow an unauthenticated, remote attacker to cause an affected CNC to become inaccessible to other devices. The vulnerability is due to improper design or implementation of the Ethernet communication modules of the CNC. An attack...