Adobe Warns Of Critical Acrobat, Reader Bugs - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
Software // Enterprise Applications
News
11/30/2006
12:56 PM
50%
50%

Adobe Warns Of Critical Acrobat, Reader Bugs

The critical unpatched bugs could be used by attackers to seize control of Windows PCs running Internet Explorer, Adobe warns.

Adobe Systems Inc. warned users of its popular Acrobat and Reader software that critical unpatched bugs could be used by attackers to seize control of Windows PCs running Internet Explorer.

The bugs, which both Adobe and FrSIRT, a French vulnerability tracker, labeled as "critical," are in the AcroPDF ActiveX control, the component of Adobe Acrobat and Adobe Reader that displays PDF documents within Internet Explorer. The Windows versions of both applications starting with v. 7.0.0 and running through the current v. 7.0.8 are flawed, said Adobe, but only users browsing with Microsoft's Internet Explorer are at risk. "Users of other browsers are not affected," Adobe said in a security advisory it posted on its site Tuesday.

The most likely exploit of the bugs would involve a malicious PDF file posted to a Web site or sent to users as an e-mail attachment. Users would have to be duped into clicking on a download link to a malformed PDF document or opening a malicious attachment.

Adobe said it was working on a patch, which would be included in Acrobat and Reader updates "in the near future." In the meantime, the company recommended that users eliminate the flawed ActiveX control by deleting the "AcroPDF.dll" file. With the .dll deleted, IE users will not be able to view PDF documents within the browser; instead, documents will open within Adobe Reader or the user will be prompted to download the file.

FrSIRT advised users that they could also protect their PCs by setting a "kill bit" in the Windows registry to disable the vulnerable ActiveX control.

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
Slideshows
IT Careers: Top 10 US Cities for Tech Jobs
Cynthia Harvey, Freelance Journalist, InformationWeek,  1/14/2020
Commentary
Predictions for Cloud Computing in 2020
James Kobielus, Research Director, Futurum,  1/9/2020
News
What's Next: AI and Data Trends for 2020 and Beyond
Jessica Davis, Senior Editor, Enterprise Apps,  12/30/2019
White Papers
Register for InformationWeek Newsletters
Video
Current Issue
The Cloud Gets Ready for the 20's
This IT Trend Report explores how cloud computing is being shaped for the next phase in its maturation. It will help enterprise IT decision makers and business leaders understand some of the key trends reflected emerging cloud concepts and technologies, and in enterprise cloud usage patterns. Get it today!
Slideshows
Flash Poll