Adobe Reader Vulnerability (CVE-2009-3459) Allows Hackers to Insert Backdoors on Computers

adobe reader vulnerability bugIn the middle of the last week, Adobe Systems Inc. security notifications reported on a vulnerability (CVE-2009-3459) that has been repeatedly discovered in Adobe Reader and Acrobat. Adobe states that cyber criminals are exploiting an unpatched threat with an aim to obtain full control of a vulnerable user's system. Adobe also states that it is planning to patch that serious security issue in Reader and Acrobat 9.1.3, Adobe Reader 8.1.6 and Acrobat 8.1.6 for Windows, Mac and Unix next Tuesday, the exact date of the previously scheduled patch release of the company for the PDF reader.

Online security news has informed that Hackers are able to exploit this particular vulnerability by convincing a user to open a booby-trapped PDF file. By successful exploits, attackers might be enabled to execute arbitrary code in the context of a user, who runs the vulnerable software program. If attackers' efforts are failed exploits are unsuccessful, the attackers’ next plan of action would most probably lead to a denial-of-service attack. The security flaw is currently being exploited in limited targeted attacks, without any development. Adobe states that only that the attacks are aimed at exploiting Adobe's free PDF Reader and Acrobat products to breach Windows operating systems.

What is so interesting, that Trend Micro discovered is that The threat in Adobe Reader and Acrobat is a Trojan horse dubbed ' Troj Pidief.Uo' in its blog post. It that comes as a PDF file, which includes a JavaScript-based malware, 'Js Agent.Dt', and then drops a backdoor called 'Bkdr Protux.Bd'. The specific vulnerability affects Microsoft Windows 98, ME, NT, 2000, XP and Server 2003, according to Trend Micro. Users running Windows Vista with a feature known as data execution prevention enabled are secured from the vulnerability. Users on other operating systems could isolate themselves from the existing vulnerability exploitation by disabling JavaScript from running inside the software program, but Adobe alerted that it’s possible to create an action that works around that measure.

This actual vulnerability case (CVE-2009-3459) is at least the third time this year that a target of hackers have targeted an unpatched vulnerability in Adobe Reader or Flash. It is argued that they are installed on a larger base of computers than any Microsoft software products. Adobe has taken flak not only for releasing buggy programs, but for taking too long to fix security issues just after their discovery. In May, Adobe promised to reinvigorate its security program for Reader. For now, what users, who are experiencing this security issue, should do is to stay watchful for Tuesday’s security update of Tuesday from Adobe in order to patch this vulnerability.

One Comment

Leave a Reply

Please DO NOT use this comment system for support or billing questions. For SpyHunter technical support requests, please contact our technical support team directly by opening a customer support ticket via your SpyHunter. For billing issues, please refer to our "Billing Questions or Problems?" page. For general inquiries (complaints, legal, press, marketing, copyright), visit our "Inquiries and Feedback" page.