“util.printf()” Another Exploited PDF In-The-Wild?
There’s a constant or recurring attack on PDF (other says Trojanized PDF) specifically exploiting “Collab.collectEmailInfo()” function and misuse of URI “mailto” [further reading]. Although Adobe already released patch and security researchers creates awareness, it seems there’s much higher value in continuing serving these threats.
I immediately take a look on the PoC and verified how this BoF(buffer overflow) works, ‘coz I’m thinking this is something to watch for … possible one of these day, we’ll see another exploited PDF in-the-wild.
Today, it’s confirmed … I just verified an exploited PDF attacking this latest vulnerability and carrying malicious payload.
Make sure to apply proper security measures to avoid infection. [Refer Adobe Security Update]