Turning off JavaScript in Adobe Reader advised to protect against the critical vulnerability.

Mathew J. Schwartz, Contributor

September 9, 2010

2 Min Read




Slideshow: Cloud Security Pros And Cons

Adobe on Tuesday warned that attacks were actively exploiting a previously unknown, "critical" vulnerability in Adobe Acrobat and Reader.

The zero-day bug has been confirmed in all versions of 8 and 9 Acrobat and Reader releases for Windows, Macintosh, and Unix, including the latest versions, 8.2.4 and 9.3.4. A successful attack will exploit a user's system.

According to an advisory published by security information service Secunia, "the vulnerability is caused due to a boundary error within the font parsing in CoolType.dll and can be exploited to cause a stack-based buffer overflow."

The vulnerability employs a PDF file with built-in malicious code, which arrives as an e-mail attachment. Executing the PDF kicks off a variety of activities, including dropping an executable file into a temporary directory and attempting to run it. The dropped file, in a move reminiscent of Stuxnet, also carries a valid digital signature, in this case from Vantage Credit Union in St. Louis, said security researcher Roel Schouwenberg at Kaspersky Lab.

"The exploit is pretty basic," he said, but interestingly it employs return-oriented programming (ROP) to bypass some vulnerability mitigation techniques built into Windows Vista and 7. "More widespread usage of ROP for exploits is something I've been expecting for a while," he said, thanks to the increasing consumer and corporate adoption of both.

While Adobe hasn't detailed any mitigation techniques for the vulnerability, "it seems that turning off JavaScript in Adobe Reader prevents the known samples of the exploit from running," said Qualys CTO Wolfgang Kandek.

The sticker is the "known samples" caveat. Security researchers are still studying versions of the attack found in the wild, which means that some as-yet-unseen variations may be immune to disabling JavaScript. Regardless, "we recommend turning off JavaScript in Adobe Reader and consider it a best practice for normal desktop usage," said Kandek.

About the Author(s)

Mathew J. Schwartz

Contributor

Mathew Schwartz served as the InformationWeek information security reporter from 2010 until mid-2014.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights