December 2, 2014 By Douglas Bonderud 2 min read

First discovered by Google’s Project Zero several months ago, a vulnerability in Adobe Reader makes it possible for malicious code to break out of the program’s sandbox and execute arbitrary instructions. According to ZDNet, the problem affects version 11.0.8 of Acrobat and Reader and was given a severity rating of 10 by the U.S. Computer Emergency Readiness Team. Now, Google is making the details of its findings public, and some users are unsure whether Adobe has done enough to fix the problem.

Adobe Reader a Big Target

Adobe owns popular software. Acrobat, Reader and Flash are used for countless business and personal applications every day, and surfing the Web and accessing documents is nearly impossible without these technologies.

As a result, Adobe and its code are high-profile targets for cybercriminals, and the company is no stranger to attacks. In 2013, McAfee discovered a flaw in Reader that allowed individuals to track the usage of a PDF.

Meanwhile, Wired recently reported on a new malware group called DarkHotel that used a fake Adobe Flash update to infect wireless network users in high-end hotels. Therefore, reports of a new Adobe Reader bug aren’t surprising, but this one may pose a more serious threat than other recent issues — and, more importantly, may not be entirely corrected.

Found It

Google’s Project Zero was the first to find this exploit and report it to Adobe, according to Threatpost. It revolves around the handling of the MoveFileEx call hook. There is a “timing race” that happens when the MoveFileEx function is resolving the location of the file source and the destination to ensure that they are within policy guidelines. A sandboxed process using an oplock can get there first, then waits for MoveFileEx to open the original file for moving.

“This allows code in the sandbox to write an arbitrary file to the file system,” James Forshaw of Project Zero told Threatpost.

It is no surprise, then, that Google had to bring this to Adobe’s attention, and Adobe dealt with it — sort of. Following the bug report, the company upgraded Reader and Acrobat to Version 11.0.9, which made it “difficult, if not impossible,” for malicious actors to use this vulnerability, according to a Google report. The bottom line? This wasn’t a patch for this specific problem, and therefore, the fix doesn’t eliminate the race condition. It just makes it much more difficult for cybercriminals to win.

Out in the Open

So why is this coming to light months after the issue was identified? According to Project Zero policy, vulnerabilities are first reported to companies that own the software, giving them the chance to fix the problem without media attention and the possibility of a copycat attack. After 90 days, however, Project Zero publishes its findings along with proof-of-concept documentation. This makes sense because users have a right to know about problems in their software, while companies get the chance to fix issues before they become public knowledge.

With the Reader vulnerability now out in the wild, the effectiveness of Adobe’s solution will be put to the test. Users should update to the latest version of Adobe Reader and Acrobat but keep an ear to the ground. Adobe’s products are big game, and when it comes to hunting cybercriminals, “difficult but not impossible” is often doublespeak for “takes a little more time.”

Image Source: Flickr

More from

How to craft a comprehensive data cleanliness policy

3 min read - Practicing good data hygiene is critical for today’s businesses. With everything from operational efficiency to cybersecurity readiness relying on the integrity of stored data, having confidence in your organization’s data cleanliness policy is essential.But what does this involve, and how can you ensure your data cleanliness policy checks the right boxes? Luckily, there are practical steps you can follow to ensure data accuracy while mitigating the security and compliance risks that come with poor data hygiene.Understanding the 6 dimensions of…

2024 roundup: Top data breach stories and industry trends

3 min read - With 2025 on the horizon, it’s important to reflect on the developments and various setbacks that happened in cybersecurity this past year. While there have been many improvements in security technologies and growing awareness of emerging cybersecurity threats, 2024 was also a hard reminder that the ongoing fight against cyber criminals is far from over.We've summarized this past year's top five data breach stories and industry trends, with key takeaways from each that organizations should note going into the following…

Black Friday chaos: The return of Gozi malware

4 min read - On November 29th, 2024, Black Friday, shoppers flooded online stores to grab the best deals of the year. But while consumers were busy filling their carts, cyber criminals were also seizing the opportunity to exploit the shopping frenzy. Our system detected a significant surge in Gozi malware activity, targeting financial institutions across North America. The Black Friday connection Black Friday creates an ideal environment for cyber criminals to thrive. The combination of skyrocketing transaction volumes, a surge in online activity…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today