Zero-day attack exploits latest version of Adobe Reader

Status
Not open for further replies.

softwareFREEk

Level 1
Thread author
Verified
Dec 27, 2012
621
Which round is this?
Punch drunk? possibly

A previously undocumented flaw in the latest version of Adobe Systems' ubiquitous Reader application is being exploited in online hacks that allow attackers to surreptitiously install malware on end-user computers, a security firm said.

The attacks, according to researchers from security firm FireEye, work against Reader 11.0.1 and earlier versions and are actively being exploited in the wild. If true, the attacks are notable because they pierce security defenses Adobe engineers designed to make malware attacks harder to carry out. Adobe officials said they're investigating the report.

"Upon successful exploitation, it will drop two DLLs," FireEye researchers Yichong Lin, Thoufique Haq, and James Bennett wrote of the online attacks they witnessed. "The first DLL shows a fake error message and opens a decoy PDF document, which is usually common in targeted attacks. The second DLL in turn drops the callback component, which talks to a remote domain." DLL is the researchers' shorthand for a file that works with the Microsoft Windows dynamic link library.

Update: Researchers with antivirus provider Kaspersky Lab have confirmed the exploit can successfully escape the Adobe sandbox, making it the first known in-the-wild attack to do so, Threatpost reporter Michael Mimoso reported. He cited a Kaspersky researcher reporting he observed an attack working against Reader 11.0.1 running on a 64-bit version of Windows 7.

So far, there have been no documented in-the-wild exploits that have successfully bypassed the Reader sandbox. The protection is designed to minimize the damage of attacks that exploit buffer overflows and other types of software bugs by isolating Web content from sensitive parts of the underlying operating system. As a result, the application will typically crash when flaws are exploited, but attackers remain unable to remotely execute malicious code on vulnerable computers.

In November, hackers claimed to possess an exploit that also pierced the security mechanism. At the Kaspersky Security Analyst Summit last week, Adobe officials said their researchers conducted a three-month investigation but never received confirmation that the attack existed.

FireEye's post was the latest to remind Reader users "not open any unknown PDF files." This advice is well-intended but largely ineffective, since many booby-trapped documents are contained in e-mails from people the victim knows or are hosted on websites the victim regularly visits. Better recommendations are to avoid PDF files whenever possible or to use an alternative PDF reader such as the Foxit Reader until Adobe has had time to diagnose the bugs and if necessary close the security hole.

Read More and Embeded Links
 
Z

ZeroDay

Update: Researchers with antivirus provider Kaspersky Lab have confirmed the exploit can successfully escape the Adobe sandbox, making it the first known in-the-wild attack to do so,

Possible bad news for sandboxies in general? hmm... Thanks for the share.
 
N

Nige_40

ZeroDay said:
Update: Researchers with antivirus provider Kaspersky Lab have confirmed the exploit can successfully escape the Adobe sandbox, making it the first known in-the-wild attack to do so,

Possible bad news for sandboxies in general? hmm... Thanks for the share.

What next, So the latest version still 11.0.01 ? that is what mine says.

So does that mean it has to be removed from your system ? Or wait till there is a patch ?

Or it only affect people who use the Sandbox within Adobe Reader ?
 
N

Nige_40

rebel4life said:
i say pack up and run for your lives lmao

Yep lol

I just seen this info to protect all of this by exterminator20 post.

So there is some post jacking here :)
 

softwareFREEk

Level 1
Thread author
Verified
Dec 27, 2012
621
Nige_40 said:
rebel4life said:
i say pack up and run for your lives lmao

Yep lol

I just seen this info to protect all of this by exterminator20 post.

So there is some post jacking here :)

nothing showed up in thread searches when I typed Adobe Reader
so I went with it, don't need to steal other members thunder..

exterminator20 can delete this if he feels the same
 
N

Nige_40

softwareFREEk said:
Nige_40 said:
rebel4life said:
i say pack up and run for your lives lmao

Yep lol

I just seen this info to protect all of this by exterminator20 post.

So there is some post jacking here :)

nothing showed up in thread searches when I typed Adobe Reader
so I went with it, don't need to steal other members thunder..

exterminator20 can delete this if he feels the same

I don't see an issue softwareFREEk

exterminator20 brought it up in a new thread, with a new title so with that is not Jacked.

and all OK. But that is my view.

So I think I will leave it there.
 

softwareFREEk

Level 1
Thread author
Verified
Dec 27, 2012
621
Nige_40 said:
softwareFREEk said:
Nige_40 said:
rebel4life said:
i say pack up and run for your lives lmao

Yep lol

I just seen this info to protect all of this by exterminator20 post.

So there is some post jacking here :)

nothing showed up in thread searches when I typed Adobe Reader
so I went with it, don't need to steal other members thunder..

exterminator20 can delete this if he feels the same


So I think I will leave it there.

agreed!
 
Status
Not open for further replies.

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top