Trend Micro threat analysts were alerted to the discovery of a zero-day exploit that affects Adobe Reader and Acrobat 9.1.3 and earlier versions (CVE-2009-3459). Trend Micro detects this as TROJ_PIDIEF.UO. This .PDF file contains an embedded JavaScript, which Trend Micro detects as JS_AGENTT.DT. This JavaScript is used to execute arbitrary codes in a technique known…
Read MoreJoseph Reyes
Advanced Threats Researcher
Cyber criminals have now updated their PDF exploits to include the getIcon() vulnerability (CVE-2009-0927). We currently detect this as TROJ_PIDIEF.OE. As usual, we highly encourage users to update now to the latest versions of Adobe Acrobat and Adobe Reader (if you haven’t yet). Reading the security advisory by Adobe closely, we see that this issue…
Read MoreOr ‘Yet Another Excel Exploit’. A post was made yesterday to Full-Disclosure on a(nother) 0-day for Excel. And yes, code execution is possible. This time, a user needs to open the file and click on a (specially-crafted, a buzzword nowadays)link specified inside the file to trigger the exploit. Same safety-precautions apply when a 0-day is…
Read MoreAccording to Internet Storm Center (ISC), a 0-day in MS word was used in a targetted attack against a certain company. We’ve also received a customer inquiry, and yes, we are aware of it.I’ve sent out a request for the sample, and hopefully, we’ll have it by today.Update(Jovs, 20 May 2006 00:48:01)We have just acquired…
Read MoreYes, obviously a copy-pasted title, and this one is from PC Magazine. To summarize, the author discusses how and what Security Vendors should do in order to keep Microsoft at bay (coming from an end-user, that is). And oh, a quote: “Trend Micro has all the right tools in the box, but its antispyware component…
Read More