Critical Vulnerability in Adobe Reader and Acrobat

Opening Adobe Acrobat PDFs is often just a double-click away. This is especially true in prepress or ad intake, where your job involves receiving PDF and other file types, throughout the day. Markzware‘s preflight solutionFlightCheck, can check many file types for print quality control, including Adobe Reader Acrobat PDF. So, Markzware keeps an eye on Acrobat PDF mentions, as in the following Adobe Reader news excerpt.

Here is an Adobe Acrobat back-door, whereby hackers have taken advantage to make a malicious PDF. Click on the source link to learn how to turn off JavaScript. Otherwise, just be careful and remember to use FlightCheck to preflight during prepress:

“Details of the vulnerability? A malicious PDF could cause the affected application to crash and could potentially allow an attacker to take control of the computer. I know that’s what we always say, but in this case, there are reports of this vulnerability being exploited in the wild, at least in the Windows world.

Luckily, the security group Shadowserver has verified the exploit with Adobe Reader 8 and 9 on Windows. Their posting explains that the vulnerability relies in part on JavaScript, such that turning off JavaScript is an easy way to mitigate the problem. In their testing, a malicious PDF could still crash Adobe Reader if JavaScript was turned off, but it couldn’t take over the machine.” Source

FlightCheck can preflight Adobe Acrobat and many file types during prepress to ensure print quality. You can buy Markzware’s pre press software via the FlightCheck page. Preflight prepress documents in PDF workflows and more, before document output.

Share with your friends...Share on FacebookShare on LinkedInTweet about this on TwitterShare on Google+Share on RedditPin on Pinterest

Related Articles

 Markzware Holiday SALE! 

Save 20% through 2017

Promo Code: Holiday17

Stay Connected!