Malicious Programs Use PDF Vulnerabilities To Infect
Sign in

Malicious Programs Use PDF Vulnerabilities to Infect

Since the majority of malicious programs are executable, so many computer users are more cautious when downloading and running the executable files, so that they are not easily infected by malicious programs. However, this does not mean that other non-executable files are safe, some vulnerabilities exploiting program are able to hide in an Office document or PDF file, waiting to infect computers. Pdf related: jpeg to pdf mac.

Kaspersky Lab has recently intercepted a loophole exploiting program named Exploit.JS.Pdfka.ddt, which can take advantage of the PDF files to infect user's computer. The malicious program is a XFA form including Java scripts, which will be embedded in the PDF file. Once the user opens the PDF file, the vulnerability exploiting program will use CVE-2010-0 188 vulnerability to cause a buffer overflow to execute malicious code, and automatically download and run a malicious software from the Internet, then save it in the system temporary folder. Adobe Reader and Acrobat 8 (version before 8.2.1) and 9 (version before 9.3.1) are subjected to be impacted by this vulnerability.

Currently, all Kaspersky products can kill the vulnerability exploiting program. Users only need to keep the anti-virus database update to effectively intercept the malicious programs. In addition, it is recommended that users upgrade in time to the latest version of Adobe Reader and Acrobat products to prevent malicious software from exploiting vulnerabilities. What's hot about pdf: transfer word to pdf. Kaspersky Lab also reminded the majority of users that files from unknown sources must not be easily opened, in order to avoid losses led by malicious programs.

 

start_blog_img