Adobe confirms PDF zero-day, plans rush patch

By Gregg Keizer | Computerworld | InfoWorld

Adobe today said it would issue an emergency patch the week of Aug. 16 to fix a critical flaw in its Reader and Acrobat software.

The bug was disclosed by researcher Charlie Miller at last month’s Black Hat security conference when he demonstrated how the open-source BitBlaze toolkit could be used to boost bug-hunting productivity tenfold.

Miller, an analyst with Baltimore-based Independent Security Evaluators, is well-known for finding vulnerabilities in Adobe’s popular Reader PDF viewer. Last March, Miller showed how a simple fuzzing tool could root out scores of potential bugs in Reader, Microsoft Office, Apple’s Preview, and other software.

According to a paper Miller published after the Black Hat conference ( download PDF ), and others, the bug is in Reader’s and Acrobat’s font parsing.

“This can be exploited to corrupt memory via a PDF file containing a specially-crafted TrueType font,” stated Danish vulnerability tracker Secunia in an advisory published Wednesday. “Successful exploitation may allow execution of arbitrary code.”

Today, Adobe announced it would release a rush, or “out-of-band” security update during the week of Aug. 16-20. Adobe issues its quarterly security updates for Reader and Acrobat on Tuesdays, and has shipped emergency fixes on that same day of the week. If the company continues the practice, it would most likely deliver the out-of-band patch on Aug. 17.

Adobe hinted that the out-of-band update will include fixes for vulnerabilities other than the one Miller uncovered. The company also said it would still ship its next regularly-scheduled quarterly update on Oct. 12.

Although the Adobe vulnerability shares traits with the one currently being used to “jailbreak” Apple’s iOS mobile operating system — both involve font parsing errors — they’re not linked, Miller said.

“Its just a coincidence that they are both bugs in the way programs parse fonts in PDFs,” Miller said in an e-mail reply to questions.

The vulnerability exploited by the JailbreakMe software is in Apple ‘s PDF viewer, dubbed Preview, not in Adobe’s Reader, a fact that Adobe tried to make clear yesterday. “Not all PDF-related vulnerabilities are automatically Adobe vulnerabilities,” argued Brad Arkin, Adobe’s head of security and privacy, pointing out that the formerly proprietary PDF was issued as an open standard in 2008.

To read the rest of this article, you can find it at the here.

Be the first to comment

Leave a Reply

Your email address will not be published.


error: Content is protected !!