• Services
    • Asses
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Transform
      • SOC Consultancy
      •     SOC Maturity Assessment
      •     SOC Model Evaluation
      •     SOC Gap Analysis
      •     SIEM Gap Analysis
      •     SIEM Optimization
      •     SOC Content Pack
    • Train
      • Security Awareness and Training
      • Tabletop Exercise
      • Simulated Cyber Attack Exercises
    • Respond
      • Incident Response
      • Incident Analysis
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
Rewterz Threat Advisory – CVE-2017-13695, CVE-2018-5873, CVE-2018-16658 – Oracle VM Server for x86 update for kernel-uek
October 1, 2018
Rewterz Threat Advisory – North Korean state-funded APT38 launches financially motivated attacks worldwide
October 4, 2018

Rewterz Threat Advisory – Adobe Acrobat Reader DC Remote Code Execution Vulnerability

October 3, 2018

A vulnerability is found in various versions of Adobe Acrobat Reader DC which leads to Remote Code Execution when exploited.

 

 

IMPACT:  MEDIUM

 

 

PUBLISH DATE:  03-10-2018

 

 

OVERVIEW

 

 

A new vulnerability is found in Adobe Acrobat Reader DC. Rich in features, Adobe Acrobat Reader is the most popular PDF reader with a large user-ship. It’s also installed as a plug-in in web browsers for opening PDFs. This vulnerability can be triggered when a user visits a malicious web page or a specially crafted email attachment.

 

 

Successful exploit allows attackers to execute arbitrary code with current user privileges. Closing the application leads to a use-after-free condition whereas unsuccessful exploit will induce Denial of Service.

 

 

ANALYSIS

 

 

A PDF file containing a specific JavaScript code can lead to a use-after-free condition when opening a PDF document in Adobe Acrobat Reader’s multiple versions. When the victim opens the malicious file or visits the malicious web-page, the attacker can execute arbitrary code on the system through careful memory corruption.

 

 

To allow for interactive PDF forms, the Adobe Acrobat Reader DC supports embedded JavaScript code in the PDF. Exploiting this support, attackers are able to control memory layout and therefore an additional attack surface is added.

 

 

AFFECTED PRODUCTS

 

 

  • Acrobat DC (Continuous Track) for Windows and macOS version 2018.011.20063 and prior
  • Acrobat Reader DC (Continuous Track) for Windows and macOS version 2018.011.20063 and prior
  • Acrobat 2017 (Classic 2017 Track) for Windows and macOS version 2017.011.30102 and prior
  • Acrobat Reader 2017 (Classic 2017 Track) for Windows and macOS version 2017.011.30102 and prior
  • Acrobat DC (Classic 2015 Track) for Windows and macOS version 2015.006.30452 and prior
  • Acrobat Reader DC (Classic 2015 Track) for Windows and macOS version 2015.006.30452 and prior

 

 

UPDATES

 

 

Updates are available for the affected versions. It is recommended to update all affected versions as soon as possible.

Please follow the Adobe Security Bulletin for further details on how to update products.

 

 

Also ensure that users are aware of the latest security measures. Send reminders and alerts to make sure they don’t open links and documents coming from unknown or unreliable sources. Vulnerabilities that require user interaction can be mitigated by diligent behavior.

 

 

If you think you’re a victim of a cyber-attack, immediately send an email to info@rewterz.com.

 

 

  • Services
    • Asses
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Respond
      • Incident Response
      • Incident Analysis
  • Transform
    • SOC Consultancy
    •     SOC Maturity Assessment
    •     SOC Model Evaluation
    •     SOC Gap Analysis
    •     SIEM Gap Analysis
    •     SIEM Optimization
    •     SOC Content Pack
  • Train
    • Security Awareness and Training
    • Tabletop Exercise
    • Simulated Cyber Attack Exercises
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
COPYRIGHT © REWTERZ. ALL RIGHTS RESERVED.