A new critical vulnerability has been discovered in Adobe Reader. This vulnerability could crash Adobe Reader due...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
to a stack buffer overflow bug, which potentially allows an attacker to run malicious code on the user's computer. This critical Adobe Reader vulnerability is reported to be widely exploited, and has been added to MetaSploit.
All 9.3.4 and earlier versions of Adobe Reader are affected by this vulnerability (including Windows, Macintosh and Unix versions). The Adobe Reader vulnerability (CVE-2010-2883) relies on a buffer boundary checking issue in the font parsing code in the cooltype.dll file. Adobe is currently evaluating the schedule for an update.
Affected software versions are:
- Adobe Reader 9.3.4 and earlier versions for Windows, Macintosh and UNIX
- Adobe Acrobat 9.3.4 and earlier versions for Windows and Macintosh
Adobe’s security advisory suggests that users of Adobe Reader or Acrobat 9.3.4 (or earlier) on Windows can utilize Microsoft's Enhanced Mitigation Evaluation Toolkit (EMET) to help prevent this vulnerability from being exploited. More information on EMET and implementation of this mitigation can be found on the Microsoft Security Research and Defense blog. Due to the time-sensitive nature of this issue, Adobe also recommends that users test this mitigation in their environment to minimize any impact on workflows.
According to Carl Leonard, Sr Manager, Websense Security Labs, “This threat is an example of how an email can use social engineering to encourage users to open an attached file. The optimum way to mitigate the threat from propagating in and around your corporate network is to prevent the email from reaching the network in the first place. This can be achieved by using a Security as a Service (SaaS) solution that combines knowledge of email, web and file-based attack vectors.”