Personal Tech Pipeline | News | Adobe Patches Critical Reader, Acrobat Flaws

White Papers

Sponsor Resources

Free Newsletter GlossaryContact UsAbout Us
Players & CamsPhones & PDAsHome & AutoOnline

August 18, 2005

Adobe Patches Critical Reader, Acrobat Flaws

Courtesy of TechWeb News

Users of the ultra-popular Adobe Reader and Acrobat applications should patch the software pronto to plug a highly critical vulnerability that could let attackers crash systems and inject malicious code into PCs and Macs.

According to Adobe, the buffer overflow vulnerability lies within an unnamed core application plug-in that's part of both Acrobat and the free Reader. An attacker who creates a malicious PDF file and tricks a user into opening it could crash the app, and perhaps execute additional code to grab control of the machine.

Windows, Mac, Linux, and Solaris editions of Acrobat and Reader are vulnerable to the flaw, Adobe said in its security advisory. New versions of Acrobat and Reader have been posted on the Adobe download site, although current users can also update from within the applications.

Because Adobe Reader is present on about 90 percent of desktops -- the free viewer makes it possible to open, read, and print the PDF file format, a popular way to present documents on the Internet -- security vendors such as Secunia rated the vulnerability as "highly critical" and recommended that users update as soon as possible. U.S. CERT, the United States Computer Emergency Response Team, issued its own advisory and also advised users to "access PDF files from trusted or known sources [to reduce] the chances of exploitation."

E-mail This Story
Print This Story
Reprint This Story

Get the latest Personal Tech news, product info, and trends every week.

Related Content

  Right-click and choose Copy to extract RSS Feed URL  Personal Tech Pipeline's Main RSS Feed
  Right-click and choose Copy to extract RSS Feed URL  Personal Tech Pipeline's Blog RSS Feed

Keeping Up To Date On Enterprise Server Tech?
Review our compilation of columns on server security, database software, and Linux issues.
How to Achieve High Performance Through IT
Learn to achieve high performance by aligning IT to
strategic objectives and solutions to unlock that value.
Using Current Performance to Shape
Future Results

Hear new strategies for improving business
performance and results.

Editor's Picks

Well, Microsoft has "unfolded" its "Origami" ultra-mobile PC platform Thursday. It turned out to be a full-featured PC smaller than a tablet but bigger than a PDA. Are you impressed?
Yes! I want one!
Sort of. We'll see.
No! It's too big for a pocket and too small for real computing. What's the point?

In search of personal tech products? See our new Product Finder, where you'll find personal computing devices, communications solutions, security products, and more.

On the CIO Agenda with IBM
With business growth back on the agenda, the role of the CIO is changing from manager of technology to C-suite collaborator in enabling innovation that matters for the business. Read an executive summary and register to download the full IBM paper.

Symantec Backup Solutions
Desktop to Data Center Protection. Explore the Official Symantec Site.

SEC & HIPAA IM Compliance
Satisfy regulatory and compliance requirements for instant messaging.

Secure & Easy Console Management with Digi CM
The Digi CM console server provides secure, intelligent & easy access to network devices with a serial console port. With Digi CM, you can securely monitor & control servers, routers, switches & other devices even when your network is down.

Learn how much you save with open source.
Find out how much of a financial impact open source can have on your enterprise. Get these tools now, compliments of JBoss. Go!

Buy a Link Now

Top ten search terms from the TechWeb TechEncyclopedia
How does your pay rate? Check the InformationWeek Salary Survey
Mobilized Solutions Guide: Find and compare solutions for your business
Top Requested White Paper Categories from TechWeb White paper Library
Top ten search terms from the TechWeb TechEncyclopedia