Adobe Reader zero-day exploit spotted in the wild
Posted on 13 February 2013.
Researchers form security firm FireEye have found in the wild a PDF file that exploits a new zero-day vulnerability in Adobe Reader.

"Upon successful exploitation, it will drop two DLLs. The first DLL shows a fake error message and opens a decoy PDF document, which is usually common in targeted attacks. The second DLL in turn drops the callback component, which talks to a remote domain," they explained, adding that they have already contacted Adobe about it.

Adobe has yet to confirm the finding, but they said that they were aware of the report of the vulnerability and that they are investigating it and assessing the risk to their customers.

According to FireEye, Adobe PDF Reader 9.5.3, 10.1.5, and 11.0.1 are affected by the flaw, and users should refrain from opening unknown PDF files until the vulnerability is patched, as well as disable the Adobe PDF plugin in the browser(s) they use.









Spotlight

Cloned, booby-trapped Dark Web sites steal bitcoins, login credentials

Apart from being a way for dissidents and journalists to do their business without being spotted and identified by "the powers that be", the Dark Web is also a place where criminals sell and buy illegal wares and services and, apparently, where they also get robbed by scammers.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Fri, Jul 3rd
    COPYRIGHT 1998-2015 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //