Adobe JBIG2 exploits being spammed, IBM warns

Spam messages containing malicious PDFs are trying to exploit the JBIG2 flaw recently patched by Adobe Systems Inc.

IBM's Internet Security Systems division is warning customers about a wave of spam messages in the wild containing malicious PDF files trying to exploit the recently patched JBIG2 flaw.

SearchSecurity.com:
To get security news and tips delivered to your inbox, click here to sign up for our free newsletter.

In a blog posting, members of the ISS X-Force research team said the malicious code may have been integrated into toolkits in recent days. Messages sent by spam bots have been detected. The messages appear to be originating from Taiwan, IBM said.

IBM warned that the malicious files could be opened simply by opening a spam email since PDFs are sometimes auto-loaded by certain applications.

Adobe issued a critical update last week, plugging the JBIG2 flaw. Attackers had been attempting to exploit the processing error in Adobe Acrobat Reader 8 and 9, which results in a buffer overflow.

Adobe Reader 9.1 and Acrobat 9.1 update corrects the JBIG2 stream array indexing error. The image compression format is used to convert binary images.

Adobe said it should have a patch release today for Adobe Reader 7 and 8, and Acrobat 7 and 8. An update to Adobe Reader 9.1 for Unix will be released by March 25.

Dig deeper on Email and Messaging Threats (spam, phishing, instant messaging)

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close