Adobe Flaw Could Allow Hackers to Infiltrate a PC
Adobe has issued a fix for what it is calling a top-priority security flaw. The bug could allow hackers to seize control of affected machines.
The update fixes problems with Adobe Reader, the software used to open and view PDF documents. It also affects Adobe Acrobat, the software used to create PDF files. Although Acrobat is not as popular as Reader, many people will be running at least one of the two programs.
The flaws involve memory corruption and buffer flow vulnerabilities which could allow a hacker to force a computer to crash. It's a tactic that's more likely to be targeted at businesses than home users.
However, the flaws could also allow hackers to use the computer memory to access other applications, effectively allowing them to take control of the system.
The vulnerability takes effect when a user opens a specially-crafted PDF file. It's already known that some hackers are sending emails designed to trick users into opening a malicious attachment. (Source: eweek.com)
Applying Fix Should Get Highest Priority
According to Adobe, for all Windows and Mac users, both vulnerabilities have the priority rating '1'. That means people are already exploiting the problem and users should apply the fix as soon as possible. (Source: adobe.com)
Adobe uses a separate rating system for the potential damage a vulnerability could inflict. In this case, both issues are rated "critical," meaning the hackers could control a computer remotely, possibly without the user even knowing control has been lost.
Forcing Manual Download May Be Needed
Users have several options for making sure their software is up-to-date.
The first is to use the update system found within the Adobe software. By default, this is set to check for updates at regular intervals, but you can force a check and (if needed) a download by opening Adobe Reader or Acrobat, clicking on "Help" then clicking "Check for Updates."
Another alternative is to visit Adobe's website, go to the support section, and navigate to the pages for your combination of application and operating system. From here you can download and run files that will install the updates.
In both cases you can carry on working while the updates are downloading, but you may need to restart your machine when they have finished installing.
Most popular articles
- Which Processor is Better: Intel or AMD? - Explained
- How to Prevent Ransomware in 2018 - 10 Steps
- 5 Best Anti Ransomware Software Free
- How to Fix: Computer / Network Infected with Ransomware (10 Steps)
- How to Fix: Your Computer is Infected, Call This Number (Scam)
- Scammed by Informatico Experts? Here's What to Do
- Scammed by Smart PC Experts? Here's What to Do
- Scammed by Right PC Experts? Here's What to Do
- Scammed by PC / Web Network Experts? Here's What to Do
- How to Fix: Windows Update Won't Update
- Explained: Do I need a VPN? Are VPNs Safe for Online Banking?
- Explained: VPN vs Proxy; What's the Difference?
- Explained: Difference Between VPN Server and VPN (Service)
- Forgot Password? How to: Reset Any Password: Windows Vista, 7, 8, 10
- How to: Use a Firewall to Block Full Screen Ads on Android
- Explained: Absolute Best way to Limit Data on Android
- Explained: Difference Between Dark Web, Deep Net, Darknet and More
- Explained: If I Reset Windows 10 will it Remove Malware?
My name is Dennis Faas and I am a senior systems administrator and IT technical analyst specializing in cyber crimes (sextortion / blackmail / tech support scams) with over 30 years experience; I also run this website! If you need technical assistance , I can help. Click here to email me now; optionally, you can review my resume here. You can also read how I can fix your computer over the Internet (also includes user reviews).
We are BBB Accredited
We are BBB accredited (A+ rating), celebrating 21 years of excellence! Click to view our rating on the BBB.