Feeds

Critical jailbreak hole plugged in Foxit Reader

Adobe Reader unaffected

Top 5 reasons to deploy VMware with Tegile

The Foxit document reader has been updated to fix the same critical bug that currently leaves iPhones, iPads, and iPod touches wide open to malware attacks.

Foxit Reader version 4.1.1.0805 “fixes the crash issue caused by the new iPhone/iPad jailbreak program which can be exploited to inject arbitrary code into a system and execute it there,” Foxit officials said. They recommend that users install the update to protect themselves.

There are actually two underlying vulnerabilities involved in the Jailbreakme hack, and at time of writing they still made it possible to jailbreak iPhones, iPads, and iPod touches simply by visiting a site with one of the fully patched devices. While the hack isn't malicious, security watchers have warned that it's possible to exploit the same vulnerabilities to do much more nefarious things, such as install password-sniffing malware. Apple confirmed last week that a PDF reader built into iOS is vulnerable, and Foxit's advisory now makes clear their PDF reader is also susceptible.

Foxit suffered from only one of the vulnerabilities exploited by Jailbreakme.com. Interestingly, Adobe's senior director of product security and privacy Brad Arkin has said that Adobe Reader does not suffer from this vulnerability.

Adobe critics frequently hold up Foxit as an example of a PDF reader that's a safer alternative to Adobe Reader. We're not so sure. Without a doubt, it's less targeted by malicious hackers. But we're not aware of any data showing that's because there are fewer holes to exploit in the alternate reader. As the Jailbreakme bug shows, sometimes Adobe Reader is free of risks that confront its competitors. ®

This article was updated to make it clear there was only one vulnerability in Foxit.

Secure remote control for conventional and virtual desktops

More from The Register

next story
Knock Knock tool makes a joke of Mac AV
Yes, we know Macs 'don't get viruses', but when they do this code'll spot 'em
Feds seek potential 'second Snowden' gov doc leaker – report
Hang on, Ed wasn't here when we compiled THIS document
Why weasel words might not work for Whisper
CEO suspends editor but privacy questions remain
DEATH by PowerPoint: Microsoft warns of 0-day attack hidden in slides
Might put out patch in update, might chuck it out sooner
BlackEnergy crimeware coursing through US control systems
US CERT says three flavours of control kit are under attack
prev story

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
The hidden costs of self-signed SSL certificates
Exploring the true TCO for self-signed SSL certificates, including a side-by-side comparison of a self-signed architecture versus working with a third-party SSL vendor.