![]() Thus far, there are no known attacks in the wild taking advantage of the Reader flaw, although security experts contend that could likely change now that the exploit has been made public. ![]() The users then execute malware onto their computer once the files are opened.Īdobe said that it was currently investigating the issue. ![]() In these attacks, hackers typically trick victims into opening malicious files with some kind of social engineering tactic. ![]() Adobe issued an advisory Friday warning users that a proof-of-concept file had been publicly posted to the Full Disclosure mailing list, demonstrating in detail how the Adobe Reader flaw could lead to a full scale denial of service attack.Īs with other Adobe glitches, this one also enables hackers to unleash a denial of service or remote code execution attack via an infected PDF file, typically sent over e-mail.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |