Rewterz Threat Advisory – CVE-2017-13695, CVE-2018-5873, CVE-2018-16658 – Oracle VM Server for x86 update for kernel-uek
October 1, 2018Rewterz Threat Advisory – North Korean state-funded APT38 launches financially motivated attacks worldwide
October 4, 2018Rewterz Threat Advisory – CVE-2017-13695, CVE-2018-5873, CVE-2018-16658 – Oracle VM Server for x86 update for kernel-uek
October 1, 2018Rewterz Threat Advisory – North Korean state-funded APT38 launches financially motivated attacks worldwide
October 4, 2018A vulnerability is found in various versions of Adobe Acrobat Reader DC which leads to Remote Code Execution when exploited.
IMPACT: MEDIUM
PUBLISH DATE: 03-10-2018
OVERVIEW
A new vulnerability is found in Adobe Acrobat Reader DC. Rich in features, Adobe Acrobat Reader is the most popular PDF reader with a large user-ship. It’s also installed as a plug-in in web browsers for opening PDFs. This vulnerability can be triggered when a user visits a malicious web page or a specially crafted email attachment.
Successful exploit allows attackers to execute arbitrary code with current user privileges. Closing the application leads to a use-after-free condition whereas unsuccessful exploit will induce Denial of Service.
ANALYSIS
A PDF file containing a specific JavaScript code can lead to a use-after-free condition when opening a PDF document in Adobe Acrobat Reader’s multiple versions. When the victim opens the malicious file or visits the malicious web-page, the attacker can execute arbitrary code on the system through careful memory corruption.
To allow for interactive PDF forms, the Adobe Acrobat Reader DC supports embedded JavaScript code in the PDF. Exploiting this support, attackers are able to control memory layout and therefore an additional attack surface is added.
AFFECTED PRODUCTS
- Acrobat DC (Continuous Track) for Windows and macOS version 2018.011.20063 and prior
- Acrobat Reader DC (Continuous Track) for Windows and macOS version 2018.011.20063 and prior
- Acrobat 2017 (Classic 2017 Track) for Windows and macOS version 2017.011.30102 and prior
- Acrobat Reader 2017 (Classic 2017 Track) for Windows and macOS version 2017.011.30102 and prior
- Acrobat DC (Classic 2015 Track) for Windows and macOS version 2015.006.30452 and prior
- Acrobat Reader DC (Classic 2015 Track) for Windows and macOS version 2015.006.30452 and prior
UPDATES
Updates are available for the affected versions. It is recommended to update all affected versions as soon as possible.
Please follow the Adobe Security Bulletin for further details on how to update products.
Also ensure that users are aware of the latest security measures. Send reminders and alerts to make sure they don’t open links and documents coming from unknown or unreliable sources. Vulnerabilities that require user interaction can be mitigated by diligent behavior.
If you think you’re a victim of a cyber-attack, immediately send an email to info@rewterz.com.