Feeds

Adobe spanked for insecure Reader app

Download, install, then update

Beginner's guide to SSL certificates

Adobe Systems has been taken to task for offering outdated software on its downloads page that contains dozens of security vulnerabilities, several of which are already being exploited in the wild to install harmful malware on users' machines.

Visitors who obtain Adobe Reader from the company's official downloads page will find that it installs version 9.1 of the program on their computers, even though the most recent version was 9.1.2 at time of writing. That could put users at considerable peril given the number of vulnerabilities fixed in the two iterations that have come since 9.1, complains Secunia, a firm that tracks security flaws.

"Remember: The criminals only need one unpatched program to compromise your machine," the company's Mikkel Winther wrote here. "Yet, as of today, Adobe still serves version 9.1.0 on their official download location at Adobe.com, leaving the user with the task of understanding that their PC has been rendered vulnerable to attacks (from opening an innocent looking PDF attachment to surf-by-attacks when browsing websites)."

Adobe defended the practice, saying the page merely offers the Adobe Reader installer, which once running, will notify users of any pending updates.

"Adobe Updater will check for updates immediately on first launch," the company said in a statement. "Thereafter, Adobe Updater checks for updates every seven days from that first launch."

The statement went on to say that users can manually manage Reader updates if they wish.

Based on our experience with Reader, Adobe is correct when it says the installer immediately prompts users of older versions to update. But that doesn't mean that its practice is safe. With the vast majority of the computing world using the software, it's not hard to imagine some percentage of them opening a booby-trapped PDF on first use. Besides, part of making your product secure is to minimize the hassle of updating to the latest version, something that's clearly not happening here.

The public dressing down from Secunia came the same day a hacker published exploit code on Milw0rm that can escalate user privileges on machines running Reader.

"As soon as the Adobe/NOS service is started or triggered (administrator logs in, reboot possibly, etc), the attacker's specified executable could be run with elevated privileges allowing them to take full control of the target," Jeremy Brown, the author of the exploit, wrote in an email to The Register.

We'd expect this vulnerability, like most others affecting Reader, to be fixed in time. But if you've recently installed the program, we'd recommend you double check your installation to make sure you've got the latest version. ®

Intelligent flash storage arrays

More from The Register

next story
UK smart meters arrive in 2020. Hackers have ALREADY found a flaw
Energy summit bods warned of free energy bonanza
DRUPAL-OPCALYPSE! Devs say best assume your CMS is owned
SQLi hole was hit hard, fast, and before most admins knew it needed patching
Knock Knock tool makes a joke of Mac AV
Yes, we know Macs 'don't get viruses', but when they do this code'll spot 'em
Feds seek potential 'second Snowden' gov doc leaker – report
Hang on, Ed wasn't here when we compiled THIS document
Mozilla releases geolocating WiFi sniffer for Android
As if the civilians who never change access point passwords will ever opt out of this one
Why weasel words might not work for Whisper
CEO suspends editor but privacy questions remain
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.