Adobe Product Security Incident Response Team (PSIRT) is investigating reports of active exploitation of a vulnerability in Adobe Reader and Acrobat XI (11.0.1) and earlier versions.
Adobe has confirmed two vulnerabilities that could allow an unauthenticated, remote attacker to cause the affected application to crash, resulting in a denial of service (DoS) condition, or could allow the attacker to execute arbitrary code, which could result in a complete system compromise.
The following Adobe products are affected:
- Adobe Reader version 11.0.01 and prior;10.1.5 and prior; 9.5.3 and prior
- Adobe Acrobat version 11.0.01 and prior;10.1.5 and prior; 9.5.3 and prior
Third-party reports indicate that a vulnerability in Adobe reader versions 9.5.3, 10.1.5, and 11.0.1 is being actively exploited in the wild.
Adobe PSIRT has published a blog post and confirmed these vulnerabilities in security advisories at the following links: Adobe Reader and Acrobat Vulnerability Report
Adobe has released software updates at the following links:
Adobe Reader versions 11.0.02, 10.1.6 and 9.5.4 for Windows
Adobe Reader versions 11.0.02, 10.1.6 and 9.5.4 for Mac
Adobe Acrobat versions 11.0.02, 10.1.6 and 9.5.4 for Windows
Adobe Acrobat versions 11.0.02, 10.1.6 and 9.5.4 for Mac
To exploit these vulnerabilities, the attacker may provide a link that directs a user to a malicious file and use misleading language or instructions to persuade the user to follow the provided link and open the malicious file. Users are advised not to open e-mail messages from suspicious or unrecognized sources. If users cannot verify that links or attachments included in e-mail messages are safe, they are advised not to open them.
Administrators may consider enabling Protected View
in the registry and propagating that setting via Group Policy Object (GPO) to help protect Windows users.