Security Updates available for Adobe Reader and Acrobat (APSB14-19)

ITS Advisory Number: 
2014-067
Date(s) Issued: 
Tuesday, August 12, 2014
Subject: 
Security Updates available for Adobe Reader and Acrobat (APSB14-19)
Overview: 

A sandbox bypass vulnerability has been discovered in Adobe Reader and Adobe Acrobat that could allow an attacker to run native code with escalated privileges in Windows. Adobe Reader is used for viewing, printing, signing and commenting on PDF documents. Adobe Acrobat is a family of application software developed to view, create, manipulate, print and manage files in PDF format. Successful exploitation would allow malicious native code to execute, potentially without a user being aware.

Adobe is aware of evidence that this exploit is in the wild and is being used in limited, isolated attacks targeting Adobe Reader users on Windows.

Systems Affected: 
  • Adobe Reader XI (11.0.07) and earlier 11.x versions for Windows
  • Adobe Reader X (10.1.10) and earlier versions for Windows, who cannot update to version 11.0.08
  • Adobe Acrobat XI (11.0.07) and earlier 11.x versions for Windows
  • Adobe Acrobat X (10.1.10) and earlier 10.x versions for Windows
RISK
GOVERNMENT
Large and medium government entities: 
High
Small government entities: 
High
BUSINESS
Large and medium business entities: 
High
Small business entities: 
High
Home Users: 
High
Description: 

Adobe Reader and Adobe Acrobat XI (11.0.07) are prone to vulnerabilities that could allow an attacker to circumvent the sandbox protection on the Windows platform. Once bypassed, the attacker could run native code with escalated privileges on Windows.

Adobe is aware of evidence that this exploit is in the wild and is being used in limited, isolated attacks targeting Adobe Reader users on Windows.

Actions: 

We recommend the following actions be taken:

  • Install the updates provided by Adobe immediately after appropriate testing
  • Run all software as a non-privileged user (one without administrative privileges) to diminish the effects of a successful attack.
  • Remind users not to visit un-trusted websites or follow links provided by unknown or un-trusted sources.
  • Remind users not to open email attachments from unknown users or suspicious emails from trusted sources.
References: 

Adobe:
http://helpx.adobe.com/security/products/reader/apsb14-19.html

CVE:
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0546