Adobe has warned of a serious flaw affecting one of the most widely distributed client applications, Acrobat Reader. The flaw leaves users open to attack via maliciously crafted PDF files, which can be spread via e-mail attachments web page links, and can be used to take control of a system.

"Remote exploitation of a buffer overflow in Adobe Acrobat Reader for
Unix could allow an attacker to execute arbitrary code," says security firm IDefense, which discovered the flaw, in an advisory.

A number of bugs in Acrobat Reader have emerged in recent weeks, but none were particularly serious. The last serious flaw to affect Acrobat Reader was in December 2004, when Acrobat Reader 5.x and 6.x were hit by several vulnerabilities allowing remote attackers to execute malicious code.
Affected Versions

The flaw affects Acrobat Reader 5.x for Unix and
Linux, which has a large installed base despite the availability of newer versions. PDF is widely used as a platform-independent file format, and unlike Microsoft Office document formats, has full support on Unix and Linux.

The bug is in the function UnixAppOpenFilePerform(), which is called by Acrobat Reader while opening certain documents, IDefense says. User-supplied data is copied into a fixed-sized stack buffer, which leads to a stack-based buffer overflow and the execution of arbitrary code, IDefense says. A remote attacker can easily choose data to exploit the hole without needing to know stack addresses, says the firm.

The bug is made somewhat less dangerous by the fact that two error messages appear before the exploit takes effect, but closing the message windows doesn't stop the attack from taking place, IDefense says.

IDefense and Adobe recommended caution when opening attachments or following links, and says users should upgrade to an unaffected version, such as Acrobat Reader 7.0.

*Hell hath no fury like a womens anger and damn be the fool who gets in her way*

Donate to the "Baby Trey's Digital Camera" fund here .