Just five months before Microsoft Corp. ends support for Windows XP, a security firm has warned that a new zero day flaw in the aging operating system is being used by attackers to bypass the sandbox of unpatched versions of Adobe Reader.

The vulnerability allows a standard user running XP service pack 3 to boost user privileges to administrative level. This can enable a targeted attack on users running Adobe Reader versions 9.5.4, 10.1.6, 11.0.02 and older, the security firm FireEye said.


“The vulnerability cannot be used for remote code execution but could allow a standard user account to generate a code in the kernel,” a post in FireEye’s Web site said. “Currently the exploit appears to only work in Windows XP…the shellcode decodes a PE payload from the PDF, drops it in the temporary directory and executes it.”

People using the latest version of Adobe Reader should not be affected by the exploit.

FireEye recommended that the following steps be followed the mitigate risks:

1) Upgrade to the latest Adobe Reader

2) Upgrade to Microsoft Windows 7 or higher

 



Related Download
SaaS Analytics: Safe and Certain Reporting Sponsor: IBM Canada
SaaS Analytics: Safe and Certain Reporting
While big data is all the buzz, many traditional business intelligence cannot keep up with the volume it creates or how to supply decision makers with quick, actionable information from it. This report from Frost & Sullivan looks at the challenges, and a new approach to business intelligence that can better harness big data.
Register Now