Adobe released an update earlier this month for a series of vulnerabilites in its Acrobat Reader product, and at least one of the more critical flaws is already being exploited in the wild.
The bug lies in the way Adobe Reader implements the JavaScript util.printf() function, and makes it possible to overwrite the program’s memory and control its execution flow. Exploit code for the flaw has already been posted to Milw0rm.
This flaw, if exploited, can allow compromise of the system. Rather than applying the patch, consider upgrading to Adobe Reader Version 9, or use of the free PDF viewing programs that are readily available.
No comments:
Post a Comment
Please tell me what you think.