Adobe spanked for insecure Reader app
Download, install, then update
Adobe Systems has been taken to task for offering outdated software on its downloads page that contains dozens of security vulnerabilities, several of which are already being exploited in the wild to install harmful malware on users' machines.
Visitors who obtain Adobe Reader from the company's official downloads page will find that it installs version 9.1 of the program on their computers, even though the most recent version was 9.1.2 at time of writing. That could put users at considerable peril given the number of vulnerabilities fixed in the two iterations that have come since 9.1, complains Secunia, a firm that tracks security flaws.
"Remember: The criminals only need one unpatched program to compromise your machine," the company's Mikkel Winther wrote here. "Yet, as of today, Adobe still serves version 9.1.0 on their official download location at Adobe.com, leaving the user with the task of understanding that their PC has been rendered vulnerable to attacks (from opening an innocent looking PDF attachment to surf-by-attacks when browsing websites)."
Adobe defended the practice, saying the page merely offers the Adobe Reader installer, which once running, will notify users of any pending updates.
"Adobe Updater will check for updates immediately on first launch," the company said in a statement. "Thereafter, Adobe Updater checks for updates every seven days from that first launch."
The statement went on to say that users can manually manage Reader updates if they wish.
Based on our experience with Reader, Adobe is correct when it says the installer immediately prompts users of older versions to update. But that doesn't mean that its practice is safe. With the vast majority of the computing world using the software, it's not hard to imagine some percentage of them opening a booby-trapped PDF on first use. Besides, part of making your product secure is to minimize the hassle of updating to the latest version, something that's clearly not happening here.
The public dressing down from Secunia came the same day a hacker published exploit code on Milw0rm that can escalate user privileges on machines running Reader.
"As soon as the Adobe/NOS service is started or triggered (administrator logs in, reboot possibly, etc), the attacker's specified executable could be run with elevated privileges allowing them to take full control of the target," Jeremy Brown, the author of the exploit, wrote in an email to The Register.
We'd expect this vulnerability, like most others affecting Reader, to be fixed in time. But if you've recently installed the program, we'd recommend you double check your installation to make sure you've got the latest version. ®
And for corporate users...
At work I dutifully registered for Adobe's site license thing (I forget the name) for the 50-machine network I manage. I'm frustrated to report that when I follow the link in the resulting e-mail to download Reader (there's a version without AIR and Acrobat.com, which is nice) I'm served the 9.0 installer. After installation, on first run this prompts to be updated but only to version 9.1.0, then restarts Reader but fails to re-run the Updater; manually starting it this second time reveals the 9.1.2 patch which can then be installed.
(These version numbers are from memory... I hope I've got them right).
Its interesting ...
Here in sad old geeky Linux-land PDFs and raw PostScript files just render in the native viewer, complete with bookmarks, thumbnails, etc. No Adobe reader needed (although there IS one for linux, which is totally pointless, just as bloated and slow) no third-party software needed. It all just works. Even within the browser.
An additional plus is the thumbnails on the desktop of both PDF and PostScript files, too.
Nice. And free. And very fast.
And on top of all that (o, so true!), Creative Suite 3 in an enterprise environment dumps massive config files in the user's profile so he has instantly exceeded his allowed profile storage space and he can't even log off unless he can figure out what happened (not half likely) and deletes the rubbish.
Maybe we need a dog-droppings icon??