Home » Archive

Articles tagged with: PDF Exploits and Vulnerabilities

General News, PDF Security »

[26 Feb 2010 | No Comment | ]

IBM X-Force (R) 2009 Trend and Risk Report reveals soaring phishing and format related threats with PDF document and editors.

Adobe Acrobat, Adobe Reader, General News, PDF Security »

[9 Jan 2010 | 2 Comments | ]

Security firm Qualys report that Adobe Reader’s software should be a top priority for IT security managers.

Acrobat 9, Adobe Acrobat, Adobe Reader, General News, PDF JavaScript »

[18 Oct 2009 | No Comment | ]

Early last week – Adobe rolled out a substantial path which covered just under 30 security issues. These vulnerabilities were said by ChannelWeb to leave susceptible to attacks by infected PDF-apps.

Adobe Reader, General News, PDF JavaScript, PDF Security »

[12 Oct 2009 | No Comment | ]

Yet another major security hole for Adobe Reader — as detailed in ComputerWeekly.com, they won’t say why, but they’re looking to release an update tomorrow.

Adobe Reader, General News »

[28 Sep 2009 | No Comment | ]

Nart Villeneuve, a research fellow at the Citizen Lab, Munk Centre for International Studies, University of Toronto reports a malware attack on foreign correspondents in China. This attack was performed by way of an email with a PDF attachment — exploiting holes in Adobe Reader which dropped malware onto the host computer.

Adobe Acrobat, Adobe Reader, General News »

[5 May 2009 | No Comment | ]

According to a report on Reuters, Adobe “has promised to patch the newest zero-day vulnerability in its popular Adobe Reader software no later than next Tuesday, potentially adding another update to the month’s busiest patch day for the second time in three months.”

Adobe Acrobat, Adobe Reader »

[11 Mar 2009 | One Comment | ]

Adobe has released security updates for Adobe Reader 9 and Acrobat 9.

General News, PDF Reader »

[9 Mar 2009 | No Comment | ]

Foxit Software, sellers of the soon-to-be released Foxit eSlick, has announced the immediate release of a new build of their popular PDF viewer, Foxit Reader. The new build addresses three security vulnerabilities that were reported to the company late last month.

Adobe Acrobat, Adobe Reader »

[6 Mar 2009 | No Comment | ]

The official patch for the recently announced security flaw in Adobe Acrobat and Adobe Reader is still roughly a week away, but in the mean time, a number of third parties have taken this opportunity to promote their own products, which aren’t affected by the security flaw.

Acrobat 9, Adobe Reader, General News »

[27 Feb 2009 | One Comment | ]

Lurene Grenier of Sourcefire’s Vulnerability Research Team has published an update for Adobe Reader 9 to provide defense against the recently reported Adobe Reader bug.

General News, PDF Security »

[14 Jan 2009 | No Comment | ]

RIM have corrected a vulnerability which affects some of those using the BlackBerry Enterprise Server and BlackBerry Professional software.

Adobe Reader »

[9 Nov 2008 | One Comment | ]

According to Computerworld, hackers have begun attempting to exploit one of the vulnerabilities found — and subsequently patched — in Adobe Reader last week.

Adobe Acrobat, Adobe Reader, General News »

[6 Nov 2008 | No Comment | ]

Adobe has released a patch for Adobe Reader 8 and Acrobat 8. The patch fixes critical vulnerabilities in these two applications that could cause the application to crash and could potentially allow an attacker to take control of the affected system.

Uncategorized »

[27 Sep 2008 | No Comment | ]

Reena over at the Investintech.com blog has written a post that highlights a few toolkits that could be used to exploit PDF vulnerabilities:
We all know that the PDF has had its share of PDF vulnerabilities.  FromUXSS to PDF spamming, the PDF has been targeted for its wide user base, compatibility across different systems and its reputation as a commonly deployed format for many of today’s enterprises.
A hacking toolkit called the “PDF Xploit Pack” is reportedly taking advantage of PDF vulnerabilities to gain access to the user information of infected computers. According to …