Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
A vulnerability is found in various versions of Adobe Acrobat Reader DC which leads to Remote Code Execution when exploited.
IMPACT: MEDIUM
PUBLISH DATE: 03-10-2018
OVERVIEW
A new vulnerability is found in Adobe Acrobat Reader DC. Rich in features, Adobe Acrobat Reader is the most popular PDF reader with a large user-ship. It’s also installed as a plug-in in web browsers for opening PDFs. This vulnerability can be triggered when a user visits a malicious web page or a specially crafted email attachment.
Successful exploit allows attackers to execute arbitrary code with current user privileges. Closing the application leads to a use-after-free condition whereas unsuccessful exploit will induce Denial of Service.
ANALYSIS
A PDF file containing a specific JavaScript code can lead to a use-after-free condition when opening a PDF document in Adobe Acrobat Reader’s multiple versions. When the victim opens the malicious file or visits the malicious web-page, the attacker can execute arbitrary code on the system through careful memory corruption.
To allow for interactive PDF forms, the Adobe Acrobat Reader DC supports embedded JavaScript code in the PDF. Exploiting this support, attackers are able to control memory layout and therefore an additional attack surface is added.
AFFECTED PRODUCTS
UPDATES
Updates are available for the affected versions. It is recommended to update all affected versions as soon as possible.
Please follow the Adobe Security Bulletin for further details on how to update products.
Also ensure that users are aware of the latest security measures. Send reminders and alerts to make sure they don’t open links and documents coming from unknown or unreliable sources. Vulnerabilities that require user interaction can be mitigated by diligent behavior.
If you think you’re a victim of a cyber-attack, immediately send an email to info@rewterz.com.