A program or technique that takes advantage of a vulnerability to remotely access or attack a program, computer or server.
Based on the settings of your F-Secure security product, it will either automatically delete, quarantine or rename the detected program or file, or ask you for a desired action.
Find the latest advice in our Community Knowledge Base.
See the manual for your F-Secure product on the Help Center.
Submit a file or URL for further analysis.
Exploit:W32/AdobeReader.K is detection of a malicious PDF file that is being heavily spammed through email and it appears as an attachment.
This malicious PDF file takes advantage of a vulnerability ( CVE-2007-5020)on the URI handling of PDF files. This vulnerability affects IE7, Adobe Acrobat, and Adobe Reader on some platforms.
This malware disables the Windows Firewall by issuing the following command:
Then it downloads the a file from the following FTP site and executes it:
Windows XP or Windows 2003 (Vista users are not affected) with Internet Explorer 7 installed. For more information, see Microsoft's Advisory.
Adobe Reader 8.1 and earlier, Adobe Reader 7.0.9 and earlier. Adobe Acrobat Professional, 3D and Standard 8.1 and earlier versions, Adobe Acrobat Professional, Standard, 3D and Elements 7.0.9 and earlier.
Users should update their Adobe Reader installations ( https://www.adobe.com/support/security/bulletins/apsb07-18.html).
Date Created: -
Date Last Modified: -