Tell us about your experience. Published Dec 13, Updated Sep 15, Learn about other threats. Successful exploitation of the vulnerability could result in the malware downloading and executing arbitrary files.
What to do now To detect and remove this threat and other malicious software that may be installed in your computer, run a full-system scan with an up-to-date antivirus product such as the following:. Microsoft Security Essentials. Microsoft Safety Scanner. This threat exploits known vulnerabilities in Adobe Acrobat and Reader.
NOD32 - v. Share Flag. All Comments. Back to Software Forum. Start or search. Start New Discussion. This also uses the vulnerability to drop other malware onto the affected system, which connect to a remote URL.
The diagram above illustrates two recent versions of this attack, both of which appeared after Adobe released a security bulletin in January. This is a developing story. What are the known detections in this attack? The first two rounds of vulnerability attacks occurred in December and in the early part of January before Adobe the released the update.
Why is this attack noteworthy? Adobe already released an update on January 12 to resolve a use-after-free vulnerability in Multimedia. However, it remains highly probable that a significant number of user systems remain vulnerable to these exploits until they update their systems with Adobe's latest patch.
It is also worth noting that this attack used a more sophisticated method of embedding an obfuscated JavaScript code into the. PDF files.
0コメント