The patches are included in updates to Reader, the for-free PDF rendering utility, and Acrobat, Adobe's full-featured application; both have been tagged as Version 8.1.1.
"Critical vulnerabilities have been identified in Adobe Reader and Acrobat that could allow an attacker who successfully exploits these vulnerabilities to take control of the affected system," Adobe warned in a bulletin that detailed the patch availability. "A malicious file must be loaded in Adobe Reader or Acrobat by the end user for an attacker to exploit these vulnerabilities."
The patches come a little more than two weeks after Adobe acknowledged the bug and posted a complicated work-around that required users to edit the Windows registry.
Adobe is the most recent application developer to patch its software against a Windows-wide vulnerability that Microsoft has owned up to but has yet to fix. On Oct. 10, Microsoft's security team admitted that Windows XP and Windows Server 2003 mishandle some Uniform Resource Identifiers (URI) and promised to provide a fix in the future.
Even then, however, Microsoft said third-party developers had to shoulder some of the responsibility. "While our update will help protect all applications from malformed URIs, application vendors that handle URIs can also do stricter validation themselves to prevent malicious URIs from being passed to ShellExecute()," said Jonathan Ness, a program manager at the Microsoft Security Response Center, nearly two weeks ago.
The PDF vulnerability was disclosed in September by U.K.-based researcher Petko Petkov, who said that attackers could compromise a PC simply by persuading users to open a PDF document or view a Web page with embedded PDF content.
Links to the Adobe Reader 8.1.1 and Acrobat 8.1.1 updates are available in today's security bulletin.
This story, "Adobe Patches Critical PDF Vulnerability" was originally published by Computerworld.