Kaspersky Lab has recently intercepted a loophole exploiting program named Exploit.JS.Pdfka.ddt, which can take advantage of the PDF files to infect user's computer. The malicious program is a XFA form including Java scripts, which will be embedded in the PDF file. Once the user opens the PDF file, the vulnerability exploiting program will use CVE-2010-0 188 vulnerability to cause a buffer overflow to execute malicious code, and automatically download and run a malicious software from the Internet, then save it in the system temporary folder. Adobe Reader and Acrobat 8 (version before 8.2.1) and 9 (version before 9.3.1) are subjected to be impacted by this vulnerability.
Currently, all Kaspersky products can kill the vulnerability exploiting program. Users only need to keep the anti-virus database update to effectively intercept the malicious programs. In addition, it is recommended that users upgrade in time to the latest version of Adobe Reader and Acrobat products to prevent malicious software from exploiting vulnerabilities. What's hot about pdf: transfer word to pdf. Kaspersky Lab also reminded the majority of users that files from unknown sources must not be easily opened, in order to avoid losses led by malicious programs.