Article

Adobe JBIG2 exploits being spammed, IBM warns

SearchSecurity.com Staff

IBM's Internet Security Systems division is warning customers about a wave of spam messages in the wild containing malicious PDF files trying to exploit the recently patched JBIG2 flaw.

    Requires Free Membership to View

SearchSecurity.com:
To get security news and tips delivered to your inbox, click here to sign up for our free newsletter.

In a blog posting, members of the ISS X-Force research team said the malicious code may have been integrated into toolkits in recent days. Messages sent by spam bots have been detected. The messages appear to be originating from Taiwan, IBM said.

IBM warned that the malicious files could be opened simply by opening a spam email since PDFs are sometimes auto-loaded by certain applications.

Adobe issued a critical update last week, plugging the JBIG2 flaw. Attackers had been attempting to exploit the processing error in Adobe Acrobat Reader 8 and 9, which results in a buffer overflow.

Adobe Reader 9.1 and Acrobat 9.1 update corrects the JBIG2 stream array indexing error. The image compression format is used to convert binary images.

Adobe said it should have a patch release today for Adobe Reader 7 and 8, and Acrobat 7 and 8. An update to Adobe Reader 9.1 for Unix will be released by March 25.


There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: