CyberInsecure.com

Daily cyber threats and internet security news: network security, online safety and latest security alerts
November 4th, 2008

Adobe Patches Older Reader PDF Flaw, In Total 8 Vulnerabilities Patched

Adobe Systems Inc. today patched its Reader application for the fifth time this year, plugging eight security holes, including one that was reported to the company more than five months ago.

In late May, researchers at Core Security Technologies told Adobe of a critical vulnerability in Adobe Reader and Adobe Acrobat, the free-of-charge and for-a-fee programs, respectively, that handle PDF files. The bug, which could be used by hackers to launch attack code against Windows, Mac or Linux computers, was found in older versions of the software.

Versions 8.1.2 of Acrobat and Reader harbor the vulnerability, Core Security said in an advisory issued early today. Newer versions of the programs, Acrobat 9 and Reader 9, which were released in June, are immune.

Attackers could exploit the buffer overflow vulnerability with specially crafted PDF files, Core Security said.

Reader 8.1.2 was itself plagued by several bugs, some of which were actively exploited in the wild before Adobe could issue the update last February. In June, Adobe released a security update to 8.1.2 to plug yet another hole. That vulnerability had also been exploited by attackers before Adobe reacted.

At the time, a security expert blasted Adobe for what he called an “epidemic” of JavaScript bugs in Reader and Acrobat.

The flaw disclosed by Core Security also involved JavaScript. “The vulnerability is caused due to a boundary error when parsing format strings containing a floating point specifier in the ‘util.printf()’ JavaScript function,” said Core Security’s advisory.

Core Security uncovered the bug when it dug into an earlier-reported vulnerability in Foxit Reader, a free Reader clone available for Windows and Linux. Although that bug was found to be harmless to Adobe’s applications, on further review, Core Security found a second flaw that could, in fact, be used to attack systems.

Core Security reported its findings to Adobe on May 20, but numerous back-and-forths between Core Security and Adobe and two patch postponements delayed the coordinated release of security advisories until today.

Ironically, while Foxit Software Co. was able to patch the bug in its software in less than a month, Adobe took more than five times longer to issue fixes for its Acrobat and Reader. Ivan Arce, Core Security’s chief technology officer, declined to speculate about why Adobe took so long to patch its programs, other than to point out that today’s update fixed eight flaws altogether.

Adobe said it had no reports of active attacks using any of the eight vulnerabilities. Users running Adobe Reader or Acrobat 9 don’t need to take any action to protect their machines.

Share this article with others:

More on CyberInsecure:
  • Microsoft Patch 14 PowerPoint Vulnerabilities, Adobe Patch Reader And Acrobar 0-day Vulnerability
  • Exploit Posted For Adobe Reader PDF Zero-day Vulnerability In ‘getAnnots()’ Javascript Function
  • Unpatched 0-day PDF Flaw Harnessed To Launch Targeted Attacks
  • New PDF Exploits Toolkit Targets Windows Users With Unpatched Adobe Reader
  • F-Secure Says Users Should Stop Using Adobe Acrobat Reader

  • If you found this information useful, consider linking to it from your own website.
    Just copy and paste the code below into your website (Ctrl+C to copy)
    It will look like this: Adobe Patches Older Reader PDF Flaw, In Total 8 Vulnerabilities Patched

    Leave a Reply

    Comments with unsolicited links to other resources will be marked as spam. DO NOT leave links in comments. Please leave your real email, it wont be published.

    *
    To prove you’re a person (not a spam script), type the security word shown in the picture. Click on the picture to hear an audio file of the word.