We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message
78,797 News Articles

Hackers exploit Adobe Reader flaw

Bug is fourth to hit Adobe this year

Adobe has confirmed that hackers are once again using malicious PDfs in a bit to break into Windows PCs.

This is the fourth time this year that the bug in the popular Reader PDF viewer and the Acrobat PDF maker has been exploited. Adobe said there has been "limited targeted attacks".

That phrasing generally means hackers are sending the rigged PDF documents to a short list of users, oftentimes company executives or others whose PCs contain a treasure trove of confidential information.

Adobe has promised to patch the vulnerability on Tuesday, October 13, the same day that Microsoft plans to issue its biggest-ever collection of security updates.

The bug exists in Reader and Acrobat versions 9.1.3 and earlier on Windows, Mac OS and Linux, said Adobe in a security advisory, but as far as the company knows, it is being exploited only to hijack Windows PCs.

"There are reports that this issue is being exploited in the wild in limited targeted attacks," said Adobe. "The exploit targets Adobe Reader and Acrobat 9.1.3 on Windows."

Adobe will plug the hole next week as part of its quarterly security update for Reader and Acrobat. Last June, Adobe announced it would follow the lead of companies like Microsoft and Oracle, and release regular security updates for Reader and Acrobat.

Originally, Adobe was to post patches last month, but a scramble during July to fix several flaws, including some introduced by Microsoft in a code 'library' used by its own developers, as well as those in other companies, wreaked havoc on Adobe's schedule. It said more than a month ago that it would instead push the patch date into October.

Until a patch is released next week, Windows Vista and Windows 7 users can protect themselves by enabling Data Execution Prevention (DEP), a security feature designed to stop some kinds of exploits - buffer overflow attacks in particular - by blocking code from executing in memory that's supposed to contain only data. Instructions on how to enable DEP are available on Microsoft's support site.

Windows XP users should disable JavaScript in Reader and Acrobat, added Adobe. That wouldn't block all possible attacks, but will stymie the exploit now in the wild.

Adobe has struggled this year to stay ahead of hackers. In March, the company quashed a PDF bug that attackers had been using for more than two month . It again patched Reader and Acrobat in May to block another zero-day.

In July Adobe fixed a Flash PDF-related flaw that was being used by hackers.

Next Tuesday's Reader and Acrobat updates will also patch a unknown number of other vulnerabilities, Adobe said.

Broadband speed test

PC security advice

See also: Adobe lets developers create iPhone Flash apps


IDG UK Sites

5 things we want to see in Android M: New features and fixes

IDG UK Sites

iPad mini 3 release date rumours: 'iPad mini Air' will be 30 percent thinner than current model

IDG UK Sites

Introducing generation tech

IDG UK Sites

This animated film reveals the importance of designing for everyone