Access member only content, take part in discussions with comments on blogs, news and reviews and receive all the latest security industry news directly to your inbox. Join now for free.
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can start posting.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain @scmagazine.com.au to your white-listed senders.
Adobe has missed dozens of vulnerabilities in Reader in this week’s Patch Tuesday run according to Google engineers who reported the flaws.
Sixteen vulnerabilities still affected the Windows and Mac OS X versions, while 31 critical and “trivially exploitable” bugs were found in the Linux application.
Of the 60 crashes affecting Adobe Reader for Linux, nine were potentially exploitable for remote code execution, according to Google security engineers Mateusz Jurczyk and GynDream Coldwind.
Adobe fixed 20 of the 50 vulnerabilities affecting Reader including all five critical and high severity holes. Jurczyk and Coldwind reported the flaws to Adobe as part of Google's fuzzing program which examines the PDF viewer in its Chrome browser.
Following the Patch Tuesday release, the researchers published details of the unpatched vulnerabilities to help users mitigate security risks, and have been in contact with Adobe’s Product Security Response Team to help develop patches.
They said eight of the 16 Windows and OS X Reader bugs appeared to represent unique problems, some of which could be exploited by attackers.
“Though we have no evidence these bugs are being exploited today, we are concerned that functional exploits can be built without much effort based on knowledge derived from binary diffing of the old and newly patched Windows builds,” Jurczyk said in an advisory.
“Given this, we consider users of Adobe Reader to be exposed to serious risk.
“Since the Linux Reader version remains unpatched and the Windows and OS X patches are now available for diffing and reverse engineering, we have decided that it’s in the best interest of users to be aware of these security issues without additional delay.”
Windows users were urged to upgrade to Adobe Reader X which contained a sandbox that would make exploitation more difficult, but not impossible. The feature does not exist for Mac and Linux.
Jurczyk said Adobe did not plan to release an out of band update, but would work on a fix for the remaining bugs.
The researchers published stack traces for the 16 Windows and OS X vulnerabilities but omitted meaningful data which attackers could use to find the vulnerable code paths.
Copyright © SC Magazine, Australia
To begin commenting right away, you can log in below or register an account if you don't yet have one. Please read our guidelines on commenting. Offending posts will be removed and your access may be suspended. Abusive or obscene language will not be tolerated. The comments below do not necessarily reflect the views or opinions of SC Magazine, Haymarket Media or its employees.