Thank you for this. I hope it works. I have been experiencing computer lock-up lately with my PDF file downloads. I thought something suspicious was happening. I have downloaded & installed this free version of foxitsoftware. I hope it works. Would you suggest me uninstalling the ADOBE 9.0 READER? Thanks, Lara > Date: Sat, 21 Feb 2009 13:11:50 +1000 > From: shahjen@xxxxxxxxxxxx > Subject: Acrobat pdf vulnerability > To: photoforum@xxxxxxxxxxxxxxxxxx > > Foxit is a good alternative to use for win/linux users until Adobe get this sorted > http://www.foxitsoftware.com/ > > (8Mb istalled Vs Adobe's 220Mb - no need for the pro version, the free reader works well) > http://en.wikipedia.org/wiki/Foxit > > > > > > "February 20, 2009 6:13 AM PST > Adobe warns of critical, unpatched security flaw > by Dawn Kawamoto > > Attackers are making the rounds and exploiting a critical security flaw in Adobe Reader 9 and Acrobat 9. Earlier versions of the PDF-related software are also affected by the critical security flaw, which could cause the applications to crash and potentially let an attacker gain control of a person's computer, Adobe Systems warned Thursday. > > Reports also surfaced that attackers have developed an exploit and are taking advantage of the flaw, the company said. > > Adobe has yet to develop an update to address the vulnerability but noted it expects to have one ready for Adobe Reader 9 and Acrobat 9 by March 11. After that, the company expects to launch updates for the earlier versions of the software going back to Adobe Reader 7 and Acrobat 7. > > Until then, Adobe advises, people should update their virus definitions and exercise caution when opening documents from unknown sources. > > > > Security company McAfee noted in a blog that the current attacks appear to be targeted ones but that it expects new variants of the exploit to make the rounds as more information becomes public. > > In its posting, McAfee said that malicious PDF documents began to surface at the start of the year, exploiting a vulnerability in Adobe Reader versions 8 and 9. The attackers can then take advantage of a bug in Reader to overwrite memory and gain control of executing code. After that, attackers can install a Trojan horse and from there add a proverbial backdoor to a person's computer to remotely control and monitor the infected system. > It’s the same Hotmail®. If by “same” you mean up to 70% faster. Get your account now. |