{"id":111,"date":"2009-04-30T23:08:18","date_gmt":"2009-05-01T05:08:18","guid":{"rendered":"http:\/\/www.digitallachance.com\/blog\/?p=111"},"modified":"2009-04-30T23:08:18","modified_gmt":"2009-05-01T05:08:18","slug":"adobe-reader-is-vulnerable-yet-again","status":"publish","type":"post","link":"http:\/\/digitallachance.com\/blog\/2009\/04\/adobe-reader-is-vulnerable-yet-again\/","title":{"rendered":"Adobe Reader is vulnerable yet again"},"content":{"rendered":"<p>I figured it would happen eventually, but not quite so soon.  It appears that Adobe Reader is suffering from at least two more zero-day vulnerabilities &#8211; less than two months after the JBIG2 vulnerability.\u00a0 Here&#8217;s the low-down.<\/p>\n<p style=\"text-align: left;\">All currently supported shipping versions of Adobe Reader and Acrobat (9.1, 8.1.4, and 7.1.1 and<br \/>\nearlier versions) are vulnerable to this issue. Adobe plans to provide updates for all affected versions<br \/>\nfor all platforms (Windows, Macintosh and UNIX) to resolve this issue.\u00a0 The vulnerabilities are in the JavaScript engine of the Adobe products.\u00a0 This, by the way, affects both Adobe Reader and Adobe Acrobat.\u00a0 T<span class=\"rss:item\">he vulnerabilities exist in two JavaScript functions; <strong>getAnnots()<\/strong> and <strong>spell.customDictionaryOpen()<\/strong> and both allow remote code execution.\u00a0 One way to protect yourself is to disable JavaScript &#8211; see the simple instructions from <a href=\"http:\/\/www.f-secure.com\/weblog\/archives\/00001671.html\" target=\"_blank\">F-Secure<\/a>.<br \/>\n<\/span><\/p>\n<p>Many people made this recommendation when the last vulnerability was uncovered (<a title=\"See my previous post on this topic.\" href=\"http:\/\/www.digitallachance.com\/blog\/2009\/03\/critical-adobe-reader-update-upgrade-now\/\" target=\"_self\">jbig2 vulnerability<\/a>), but it just seems to be louder this time; find an alternative reader to the Adobe Reader product.\u00a0 If you need an idea for what is available out there, take a look at <a href=\"http:\/\/pdfreaders.org\/\" target=\"_blank\">PDFreaders.org<\/a>.\u00a0 I know that I have made the recommendation where I work, but it might not be that easy.\u00a0 Corporations sometimes will rely heavyly on Adobe Reader to view custom business forms that are used on a daily basis with customers.\u00a0 That reliance will often show itself in the in-house applications that make calls directly to the Adobe DLL.<\/p>\n<p>You can read a bit more about the challenges of replacing Adobe Reader and Acrobat <a href=\"http:\/\/blogs.techrepublic.com.com\/security\/?p=1470\" target=\"_blank\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I figured it would happen eventually, but not quite so soon. It appears that Adobe Reader is suffering from at least two more zero-day vulnerabilities.  Here&#8217;s the low-down.<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[11,1],"tags":[12,40,52],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v15.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Adobe Reader is vulnerable yet again - IT A Digital Life<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/digitallachance.com\/blog\/2009\/04\/adobe-reader-is-vulnerable-yet-again\/\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\">\n\t<meta name=\"twitter:data1\" content=\"1 minute\">\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/digitallachance.com\/blog\/#website\",\"url\":\"https:\/\/digitallachance.com\/blog\/\",\"name\":\"IT A Digital Life\",\"description\":\"All things digital\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/digitallachance.com\/blog\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/digitallachance.com\/blog\/2009\/04\/adobe-reader-is-vulnerable-yet-again\/#webpage\",\"url\":\"https:\/\/digitallachance.com\/blog\/2009\/04\/adobe-reader-is-vulnerable-yet-again\/\",\"name\":\"Adobe Reader is vulnerable yet again - IT A Digital Life\",\"isPartOf\":{\"@id\":\"https:\/\/digitallachance.com\/blog\/#website\"},\"datePublished\":\"2009-05-01T05:08:18+00:00\",\"dateModified\":\"2009-05-01T05:08:18+00:00\",\"author\":{\"@id\":\"https:\/\/digitallachance.com\/blog\/#\/schema\/person\/8a2f0b2a18af80d71541deadfac4d02f\"},\"breadcrumb\":{\"@id\":\"https:\/\/digitallachance.com\/blog\/2009\/04\/adobe-reader-is-vulnerable-yet-again\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/digitallachance.com\/blog\/2009\/04\/adobe-reader-is-vulnerable-yet-again\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/digitallachance.com\/blog\/2009\/04\/adobe-reader-is-vulnerable-yet-again\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"item\":{\"@type\":\"WebPage\",\"@id\":\"https:\/\/digitallachance.com\/blog\/2009\/04\/adobe-reader-is-vulnerable-yet-again\/\",\"url\":\"https:\/\/digitallachance.com\/blog\/2009\/04\/adobe-reader-is-vulnerable-yet-again\/\",\"name\":\"Adobe Reader is vulnerable yet again\"}}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/digitallachance.com\/blog\/#\/schema\/person\/8a2f0b2a18af80d71541deadfac4d02f\",\"name\":\"Francois\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/digitallachance.com\/blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"http:\/\/0.gravatar.com\/avatar\/ce2ee0649f3fb6a643ffff9a9f1e63e4?s=96&d=mm&r=g\",\"caption\":\"Francois\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","_links":{"self":[{"href":"http:\/\/digitallachance.com\/blog\/wp-json\/wp\/v2\/posts\/111"}],"collection":[{"href":"http:\/\/digitallachance.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/digitallachance.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/digitallachance.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/digitallachance.com\/blog\/wp-json\/wp\/v2\/comments?post=111"}],"version-history":[{"count":0,"href":"http:\/\/digitallachance.com\/blog\/wp-json\/wp\/v2\/posts\/111\/revisions"}],"wp:attachment":[{"href":"http:\/\/digitallachance.com\/blog\/wp-json\/wp\/v2\/media?parent=111"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/digitallachance.com\/blog\/wp-json\/wp\/v2\/categories?post=111"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/digitallachance.com\/blog\/wp-json\/wp\/v2\/tags?post=111"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}