April 21, 2011, 4:38 PM — Adobe on Thursday patched a critical bug in Adobe Reader, its popular PDF viewer, beating its self-imposed deadline by several days.
Hackers have already begun exploiting the bug in malicious PDF files, Adobe confirmed.
Adobe owned up to a Flash Player flaw last week after an independent researcher found exploits in embedded Flash files within Microsoft Word and Excel files attached to emails.
It was the second time in four weeks that Adobe had to acknowledge a Flash "zero-day," or unpatched vulnerability that hackers were exploiting.
The Flash bug also existed in Adobe Reader and Acrobat, both of which include code that renders Flash content inserted into PDF files.
Adobe shipped a patched version of Flash Player on April 15. At that time, Adobe said it would fix Reader and Acrobat sometime during the week of April 25.
Since last week, attacks have appeared that exploit the bug in Reader and Acrobat, Adobe said today.
Mila Parkour, the security researcher who reported the flaw to Adobe, has tracked malicious PDF documents exploiting the vulnerability. The PDFs carry filenames that tout information about China, Russia, the Obama administration and the Middle East, Parkour said today on her Contagio Malware Dump blog.
The rogue PDFs are attached to messages purportedly from editors at the New York Times, although in reality they originated from servers in Utah and China.
Today's Reader and Acrobat updates also patch a second critical vulnerability that Adobe said has not yet been exploited in the wild.
Adobe Reader X, the version that launched late last year -- and which includes anti-exploit "sandbox" technology that isolates Reader from the rest of the computer -- blocks attack code execution, said Adobe. The company will patch the vulnerability in Reader X in mid-June as part of its already-scheduled security updates.