Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.

New Zero-Day Vulnerability Hits Adobe Reader

Created: 25 Feb 2013 • Updated: 25 Feb 2013 | 2 comments
Parag 2's picture

Dear All,

Does anyone have idea whether Symantec is having solution for recent vulnerability detected for Adobe Reader?

Refer below URL for deatils of attack.

http://voices.yahoo.com/adobe-reader-hit-pdf-zero-...

Thanks & Regards,

Parag

 

Operating Systems:

Comments 2 CommentsJump to latest comment

Mithun Sanghavi's picture

Hello,

Read more in this BLOG's from Symantec Security Response Team -

New Adobe Vulnerabilities Being Exploited in the Wild

http://bit.ly/14UdGxS

New Adobe PDF Zero-day Unleashes Trojan.Swaylib

http://bit.ly/XDo0UY

Symantec is now detecting ...

Bloodhound.Flash.20 is a heuristic detection for files attempting to exploit the Adobe Flash Player Buffer Overflow Vulnerability (CVE-2013-0633).

http://bit.ly/WKHxXT

Bloodhound.Flash.19 is a heuristic detection for files attempting to exploit the Adobe Flash Player Remote Memory Corruption Vulnerability (CVE-2013-0634).

http://bit.ly/YtehBm

Hope that helps!!

Mithun Sanghavi
Senior Consultant
MIM | MCSA | MCTS | STS | SSE | SSE+ | ITIL v3

Don't forget to mark your thread as 'SOLVED' with the answer that best helped you.

Mick2009's picture

This new Security Response blog post will be of interest to followers of this thread:

2013 First Quarter Zero-Day Vulnerabilities
https://www-secure.symantec.com/connect/blogs/2013-first-quarter-zero-day-vulnerabilities

...

Symantec recommends users to follow these best security practices:

  • Ensure all applications are up to date with the latest security patches. Even though a zero-day exploit cannot be patched, the latest updates will provide protection from previously disclosed vulnerabilities.
  • Ensure antivirus and IPS definitions are up-to-date.
  • Avoid visiting sites of questionable integrity.
  • Avoid opening files provided by untrusted sources.
  • Implement multiple redundant layers of security such as non-executable and randomly mapped memory segments that may hinder an attacker's ability to exploit vulnerabilities.

 

With thanks and best regards,

Mick