To disable JavaScript in Adobe Reader, Windows users should select "Preferences" from the Edit menu, then click on "JavaScript" in the ensuing list and uncheck the box marked "Enable Acrobat JavaScript." Mac users will find Preferences under the "Adobe Reader" menu.Īdobe Reader and Acrobat are no strangers to exploits. "Is the mitigation a good step or the only step? Without a look at the exploit, we can't be sure." "What do we do in the meantime, between now and March 11, when Adobe patches this?" he asked. Storms had no better advice, but wondered if that would be enough. "In this scenario, Adobe will still crash, but the required heap spray will not occur and code execution is not possible." "The exploit can be effectively mitigated by disabling JavaScript," said Shadowserver. 's write-up recommended that users disable JavaScript in Reader and Acrobat because, although the flaw is not in that code, turning off the feature helps protect against the current exploit. "I had completely expected that this would be yet another JavaScript vulnerability in Reader," said Storms, who has blasted Adobe in the past for what he has called an "epidemic" of JavaScript bugs. That backdoor can later be used to inject additional malware into the machine.Īttacks could be initiated by spam messages that trick users into clicking through to a malicious site, or by packing exploit code in a file attachment.Īlthough neither Adobe nor Symantec provided details of the vulnerability, the site posted a partial analysis that claimed the bug was in a non-JavaScript function call. The in-the-wild attacks trigger the bug with a Trojan horse that Symantec has pegged "Pidief.e," which then installs several additional components to open a backdoor on the compromised computer. "There's no reason to think that that won't happen," he said. In the meantime, both Haley and Storms expect hackers to take advantage of the bug, possibly by integrating new attack code into the multistrike exploit kits that are frequently used by cybercriminals to launch attacks against users who are duped into visiting malicious Web sites.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |