Adobe has released Security Advisory APSA09-01 , which describes a buffer overflow vulnerability that occurs when Adobe Reader and Acrobat handle files with specially crafted JBIG2 streams. This vulnerability could allow a remote attacker to execute arbitrary code.

Adobe Security Advisory APSA09-01 describes a memory-corruption vulnerability that affects Adobe Reader and Acrobat. Further details are available in Vulnerability Note VU#905281 . An attacker could exploit these vulnerabilities by convincing a user to load a specially crafted Adobe Portable Document Format (PDF) file. Acrobat integrates with popular web browsers, and visiting a website is usually sufficient to cause Acrobat to load PDF content.

Update

Adobe has released updates to address this issue. Users are encouraged to read Adobe Security Bulletins APSB09-03 and APSB09-04 and update vulnerable versions of Adobe Reader and Acrobat.

Disable JavaScript in Adobe Reader and Acrobat



Disabling Javascript may prevent some exploits from resulting in code execution. Acrobat JavaScript can be disabled using the Preferences menu ( Edit -> Preferences -> JavaScript and un-check Enable Acrobat JavaScript ).



Prevent Internet Explorer from automatically opening PDF documents



The installer for Adobe Reader and Acrobat configures Internet Explorer to automatically open PDF files without any user interaction. This behavior can be reverted to the safer option of prompting the user by importing the following as a .REG file:

Windows Registry Editor Version 5.00



[HKEY_CLASSES_ROOT\AcroExch.Document.7]

"EditFlags"=hex:00,00,00,00