
Security firm discovered exploit capable of bypassing Adobe Reader sandbox last week Last year was a pretty decent one for Adobe Reader as it relinquished the dubious honor of being the most exploited software (as ranked by Kaspersky Lab) to Oracleâs Java. But the fact is it is still very popular among malware authors. For instance, last week security firm FireEye discovered an exploit capable of bypassing the softwareâs sandbox. Thankfully, Adobe, which wasted little time in confirming the zero-day exploit, expects to have a patch ready this week. After being informed of the vulnerabilities by FireEye, Adobe issued a security advisory (APSA13-02) confirming the presence of âcritical vulnerabilities (CVE-2013-0640, CVE-2013-0641) in Adobe Reader and Acrobat XI (11.0.01 and earlier) for Windows and Macintosh, X (10.1.5 and earlier) for Windows and Macintosh, 9.5.3 and earlier for Windows and Macintosh, and Adobe Reader 9.5.3 and earlier for Linux.â The company updated that advisory on Saturday in order to reflect the planned schedule for a patch. It expects to release the patch sometime during the ongoing week. With FireEye preferring the âresponsible disclosureâ model, the technical details of the attacks arenât known. All we know is that attackers are using malicious PDFs designed to exploit the said vulnerabilities. âUpon successful exploitation, it will drop two DLLs,â FireEye revealed in a blog post last week. âThe first DLL shows a fake error
Comment