By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
The software firm issued security advisory last week warning that the vulnerability was being actively exploited in the wild.
The vulnerability exists in Adobe Reader 9.3.4 and earlier versions for Windows, Macintosh and Unix, and Adobe Acrobat 9.3.4 and earlier versions for Windows and Macintosh.
Adobe said current exploits are targeting the Windows platform, but attacks could be mitigated using Microsoft's Enhanced Mitigation Evaluation Toolkit (EMET).
"Due to the time-sensitive nature of this issue, testing of the functional compatibility of this mitigation has been limited. Therefore, we recommend that you also test the mitigation in your environment to minimise any impact on your workflows," Adobe said in a security advisory update.
The mitigation tool will help protect users until a patch is available, which may be released before the next scheduled security update on 12 October.
In July 2009, Adobe introduced a 90-day security update cycle for its Reader and Acrobat products, but has since been forced to release four out-of-band patches for zero-day flaws.