Adobe Acrobat, Reader Under Attack From Zero-Day Exploit
Turning off JavaScript in Adobe Reader advised to protect against the critical vulnerability.
Slideshow: Cloud Security Pros And Cons |
---|
Adobe on Tuesday warned that attacks were actively exploiting a previously unknown, "critical" vulnerability in Adobe Acrobat and Reader.
The zero-day bug has been confirmed in all versions of 8 and 9 Acrobat and Reader releases for Windows, Macintosh, and Unix, including the latest versions, 8.2.4 and 9.3.4. A successful attack will exploit a user's system.
According to an advisory published by security information service Secunia, "the vulnerability is caused due to a boundary error within the font parsing in CoolType.dll and can be exploited to cause a stack-based buffer overflow."
The vulnerability employs a PDF file with built-in malicious code, which arrives as an e-mail attachment. Executing the PDF kicks off a variety of activities, including dropping an executable file into a temporary directory and attempting to run it. The dropped file, in a move reminiscent of Stuxnet, also carries a valid digital signature, in this case from Vantage Credit Union in St. Louis, said security researcher Roel Schouwenberg at Kaspersky Lab.
"The exploit is pretty basic," he said, but interestingly it employs return-oriented programming (ROP) to bypass some vulnerability mitigation techniques built into Windows Vista and 7. "More widespread usage of ROP for exploits is something I've been expecting for a while," he said, thanks to the increasing consumer and corporate adoption of both.
While Adobe hasn't detailed any mitigation techniques for the vulnerability, "it seems that turning off JavaScript in Adobe Reader prevents the known samples of the exploit from running," said Qualys CTO Wolfgang Kandek.
The sticker is the "known samples" caveat. Security researchers are still studying versions of the attack found in the wild, which means that some as-yet-unseen variations may be immune to disabling JavaScript. Regardless, "we recommend turning off JavaScript in Adobe Reader and consider it a best practice for normal desktop usage," said Kandek.
About the Author
You May Also Like
DevSecOps/AWS
Oct 17, 2024Social Engineering: New Tricks, New Threats, New Defenses
Oct 23, 202410 Emerging Vulnerabilities Every Enterprise Should Know
Oct 30, 2024Simplify Data Security with Automation
Oct 31, 2024