Adobe Acrobat exploit "triggers without opening files"

An earlier posted vulnerability about Adobe’s Reader and Acrobat softwares, turns out to be more dangerous than thought. Because of the way Acrobat adds extensions to Windows Explorer to let it understand metadata information in PDF files. A security researcher found that the code that triggers this bug can be placed inside that metadata, and just hovering your mouse cursor over the infected file, […]

An earlier posted vulnerability about Adobe’s Reader and Acrobat softwares, turns out to be more dangerous than thought. Because of the way Acrobat adds extensions to Windows Explorer to let it understand metadata information in PDF files. A security researcher found that the code that triggers this bug can be placed inside that metadata, and just hovering your mouse cursor over the infected file, not even clicking on it, will cause Explorer to try to read the PDF. The only way to get rid of the bug is to completely uninstall the Acrobat & Reader, until the fix is released, reveals Stephen Schenck.

Exploit Demo:

About The Author

Deepak Gupta is a IT & Web Consultant. He is the founder and CEO of diTii.com & DIT Technologies, where he's engaged in providing Technology Consultancy, Design and Development of Desktop, Web and Mobile applications using various tools and softwares. Sign-up for the Email for daily updates. Google+ Profile.