{"id":72781,"date":"2010-09-09T06:46:35","date_gmt":"2010-09-09T06:46:35","guid":{"rendered":"https:\/\/localhost\/wordpress\/?p=72781"},"modified":"2010-09-09T06:46:35","modified_gmt":"2010-09-09T06:46:35","slug":"zero-day-critical-vulnerability-in-adobe-reader-and-acrobat-reader","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/zero-day-critical-vulnerability-in-adobe-reader-and-acrobat-reader\/","title":{"rendered":"Zero Day critical vulnerability in Adobe Reader and Acrobat Reader"},"content":{"rendered":"<p>A critical vulnerability (CVE-2010-2883) exists in Adobe Reader 9.3.4 and earlier versions for Windows, Macintosh and Unix and Adobe Acrobat 9.3.4 and earlier versions for Windows and Macintosh. This vulnerability could cause a crash and potentially allow an attacker to take control of the affected system.<\/p>\n<p>Currently we have not come across such sample but our lab is constantly monitoring the suspicious PDF files that we receive.<\/p>\n<p>All the posts point towards below facts:<\/p>\n<p>&#8211; The vulnerability is reported to be exploited by a malware that is spreading through PDF file.<br \/>\n&#8211; The exploit works on Windows XP, Windows Vista and Windows 7 as well.<\/p>\n<p>Precautions:<br \/>\nAvoid opening PDF files that are arriving from new unknown source.<\/p>\n<p>Adobe is aware of this vulnerability and may release a out-of-band update to fix the same.<\/p>\n<p><a href=\"https:\/\/www.adobe.com\/support\/security\/advisories\/apsa10-02.html\">Visit Adobe Advisory page for more details.<\/a><\/p>\n<h3><\/h3>\n","protected":false},"excerpt":{"rendered":"<p>A critical vulnerability (CVE-2010-2883) exists in Adobe Reader 9.3.4 and earlier versions for Windows, Macintosh and Unix and Adobe Acrobat 9.3.4 and earlier versions for Windows and Macintosh. This vulnerability could cause a crash and potentially allow an attacker to take control of the affected system. Currently we have not come across such sample but [&hellip;]<\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-72781","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/72781"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=72781"}],"version-history":[{"count":0,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/72781\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=72781"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=72781"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=72781"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}