Adobe patches critical PDF vulnerability

Adobe Systems Inc. patched its Reader and Acrobat programs today to fix a flaw that exposed most Windows XP users to exploits arriving in malicious PDF files.

The patches are included in updates to Reader, the for-free PDF rendering utility, and Acrobat, Adobe’s full-featured application; both have been tagged as Version 8.1.1.

“Critical vulnerabilities have been identified in Adobe Reader and Acrobat that could allow an attacker who successfully exploits these vulnerabilities to take control of the affected system,” Adobe warned in a bulletin that detailed the patch availability. “A malicious file must be loaded in Adobe Reader or Acrobat by the end user for an attacker to exploit these vulnerabilities.”

Only users of Microsoft Corp.’s Windows XP who have Internet Explorer 7 installed are at risk of such attacks, Adobe added. The patches come a little more than two weeks after Adobe acknowledged the bug and posted a complicated work-around that required users to edit the Windows registry.

Adobe is the most recent application developer to patch its software against a Windows-wide vulnerability that Microsoft has owned up to but has yet to fix. On Oct. 10, Microsoft’s security team admitted that Windows XP and Windows Server 2003 mishandle some Uniform Resource Identifiers (URI) and promised to provide a fix in the future.

Even then, however, Microsoft said third-party developers had to shoulder some of the responsibility. “While our update will help protect all applications from malformed URIs, application vendors that handle URIs can also do stricter validation themselves to prevent malicious URIs from being passed to ShellExecute(),” said Jonathan Ness, a program manager at the Microsoft Security Response Center, nearly two weeks ago.

Other vendors that have updated their software include Mozilla Corp. and Skype Ltd., who patched the Firefox browser and the Skype VoIP software, respectively, back in July.

The PDF vulnerability was disclosed in September by U.K.-based researcher Petko Petkov, who said that attackers could compromise a PC simply by persuading users to open a PDF document or view a Web page with embedded PDF content.

Links to the Adobe Reader 8.1.1 and Acrobat 8.1.1 updates are available in today’s security bulletin.

Would you recommend this article?

Share

Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.


Jim Love, Chief Content Officer, IT World Canada

Featured Download

Featured Articles

Cybersecurity in 2024: Priorities and challenges for Canadian organizations 

By Derek Manky As predictions for 2024 point to the continued expansion...

Survey shows generative AI is a top priority for Canadian corporate leaders.

Leaders are devoting significant budget to generative AI for 2024 Canadian corporate...

Related Tech News

Tech Jobs

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

Tech Companies Hiring Right Now