{"id":12937,"date":"2011-12-14T12:26:29","date_gmt":"2011-12-14T20:26:29","guid":{"rendered":"http:\/\/blogs.mcafee.com\/?p=12937"},"modified":"2025-06-02T01:24:08","modified_gmt":"2025-06-02T08:24:08","slug":"inside-adobe-reader-zero-day-exploit-cve-2011-2462","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/inside-adobe-reader-zero-day-exploit-cve-2011-2462\/","title":{"rendered":"Inside Adobe Reader Zero-Day Exploit CVE 2011-2462"},"content":{"rendered":"<p>Recently a critical vulnerability has been identified in Adobe Reader X and Adobe Acrobat X Versions 10.1.1 and earlier for Windows and Mac OS, Reader 9.4.6\u00a0and Reader 9.x Versions for Unix. This zero-day vulnerability <a href=\"http:\/\/www.adobe.com\/support\/security\/advisories\/apsa11-04.html\">(CVE-2011-2462)<\/a> could allow an attacker to execute arbitrary code and silently take the control of a\u00a0victim&#8217;s machine. This flaw is currently being exploited in the wild. Adobe says it will release a patch this week.<\/p>\n<p>McAfee researchers analyzed the exploit (the sample circulating in the wild) and figured out how the vulnerability is exploited and identified the malicious binary, which allows an attacker to take the control of the system.<\/p>\n<p>Using the MD5 algorithm we found a hash value of b025b06549caae5a7c1d23ac1d014892. The technique used in this exploit has been known to researchers for ages.<\/p>\n<p>Here&#8217;s what we found as output when we ran the PDFiD tool against this exploit.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/?attachment_id=12939\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-12939\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2011\/12\/untitled1.png\" alt=\"\" width=\"450\" height=\"266\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2011\/12\/untitled1.png 450w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2011\/12\/untitled1-300x177.png 300w\" sizes=\"auto, (max-width: 450px) 100vw, 450px\" \/><\/a><\/p>\n<p>Looking at the output, we can immediately make out what this exploit would contain. Like many other exploits in the wild, this document uses the techniques of \/JavaScript and \/OpenAction to launch its malicious JavaScript. The combination of both of these techniques would make this document suspicious to any researcher.<\/p>\n<p>\/JS\u00a0and \/JavaScript indicates that this PDF document contains the JavaScript. \/OpenAction\u00a0indicates the action to be performed automatically when the document is viewed. Let\u2019s take the deeper look at the object structure of the PDF and find out what is interesting.<\/p>\n<h2><strong><span style=\"text-decoration: underline;\">Object Analysis of the PDF document<\/span><\/strong><\/h2>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/?attachment_id=12941\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-12941\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2011\/12\/21.png\" alt=\"\" width=\"693\" height=\"150\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2011\/12\/21.png 693w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2011\/12\/21-300x64.png 300w\" sizes=\"auto, (max-width: 693px) 100vw, 693px\" \/><\/a><\/p>\n<p><strong>Object 1<\/strong> contains the author, email, and the web&#8211;a kind of meta information.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/?attachment_id=12942\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-12942\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2011\/12\/3.png\" alt=\"\" width=\"736\" height=\"150\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2011\/12\/3.png 736w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2011\/12\/3-300x61.png 300w\" sizes=\"auto, (max-width: 736px) 100vw, 736px\" \/><\/a><\/p>\n<p><strong>Object 4<\/strong> has an \/OpenAction reference to object 14, which seems particularly interesting. Let&#8217;s take a look at what is in the referenced object.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/?attachment_id=12943\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-12943\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2011\/12\/4.png\" alt=\"\" width=\"735\" height=\"100\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2011\/12\/4.png 735w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2011\/12\/4-300x40.png 300w\" sizes=\"auto, (max-width: 735px) 100vw, 735px\" \/><\/a><\/p>\n<p><strong>Object 14,<\/strong> as seen above, has the stream link to object 15, which contains the actual compressed JavaScript.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/?attachment_id=12944\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-12944\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2011\/12\/5.png\" alt=\"\" width=\"736\" height=\"201\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2011\/12\/5.png 736w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2011\/12\/5-300x81.png 300w\" sizes=\"auto, (max-width: 736px) 100vw, 736px\" \/><\/a><\/p>\n<p>This is the malicious JavaScript that is encoded twice, first with ASCIIHexDecode and then with FlateDecode. These stream filters will indicate\u00a0to Reader how to decode the streams while opening the document. This combination of stream filters is widely used in exploits to compress the code. We\u2019ll take a look at the JS code a little later in this analysis. In the meantime, let\u2019s move further into the object structure analysis of the PDF.<\/p>\n<p><strong>Object 11<\/strong> contains the stream link to Object 10, as seen below. This stream link contains the Flate-encoded 3D Annotations data that is to be Flate decoded and displayed while the Reader document is rendered.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/?attachment_id=12945\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-12945\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2011\/12\/6.png\" alt=\"\" width=\"600\" height=\"270\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2011\/12\/6.png 600w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2011\/12\/6-300x135.png 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/a><\/p>\n<p>According to the Adobe 3D Annotations documentations <a href=\"http:\/\/www.adobe.com\/content\/dam\/Adobe\/en\/devnet\/acrobat\/pdfs\/3DAnnotations.pdf\">available here,<\/a>\u00a03DD entry of the Annotations data specifies the Flate-encoded data stream containing the U3D data. That\u2019s exactly what we see in<strong> Object 10, <\/strong>as shown below.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/?attachment_id=12946\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-12946\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2011\/12\/7.png\" alt=\"\" width=\"736\" height=\"307\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2011\/12\/7.png 736w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2011\/12\/7-300x125.png 300w\" sizes=\"auto, (max-width: 736px) 100vw, 736px\" \/><\/a><\/p>\n<p>This U3D data is likely to cause memory corruption and trigger the vulnerability. <strong>Object 16 <\/strong>is of special interest to us. Let\u2019s see how this object looks.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/?attachment_id=12947\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-12947\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2011\/12\/8.png\" alt=\"\" width=\"735\" height=\"180\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2011\/12\/8.png 735w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2011\/12\/8-300x73.png 300w\" sizes=\"auto, (max-width: 735px) 100vw, 735px\" \/><\/a><\/p>\n<p>This object does not have any references and contains the stream that is supposed to be Flate encoded. This stream contains the malicious XORed executable that is dropped after successful exploitation. Let\u2019s see if we can figure out the XOR key.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/?attachment_id=12951\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-12951\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2011\/12\/92.png\" alt=\"\" width=\"735\" height=\"401\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2011\/12\/92.png 735w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2011\/12\/92-300x163.png 300w\" sizes=\"auto, (max-width: 735px) 100vw, 735px\" \/><\/a><\/p>\n<p>The executable is XORed by 0x12. Looks like this stream wasn\u2019t Flate encoded but rather simply XORed to embed the malicious file within. This technique is normally used in exploits to hide the malicious code and bypass AV detections.<\/p>\n<p>Let\u2019s take a look at the decoded JS code from <strong>Object 15<\/strong> to understand what it does.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-12952\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2011\/12\/10.png\" alt=\"\" width=\"490\" height=\"721\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2011\/12\/10.png 490w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2011\/12\/10-203x300.png 203w\" sizes=\"auto, (max-width: 490px) 100vw, 490px\" \/><\/p>\n<p>This code checks for supposedly nonexistent versions of Reader and apparently enters an infinite loop if the version comes out to be greater than 10.0. The code appears to use a heap-spray technique to exploit this vulnerability and execute the shellcode. The end of this code checks for the Windows platform and sets the document to page 2 if it is running on Windows and will render the 3D data specified by the U3D file&#8211;causing the corruption.<\/p>\n<p>The heap-spray function in the JS code looks like this:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/?attachment_id=12953\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-12953\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2011\/12\/11.png\" alt=\"\" width=\"736\" height=\"200\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2011\/12\/11.png 736w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2011\/12\/11-300x81.png 300w\" sizes=\"auto, (max-width: 736px) 100vw, 736px\" \/><\/a><\/p>\n<p>The last function call in the preceding figure allocates the memory and fills up the heap as seen below:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/?attachment_id=12954\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-12954\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2011\/12\/12.png\" alt=\"\" width=\"590\" height=\"309\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2011\/12\/12.png 590w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2011\/12\/12-300x157.png 300w\" sizes=\"auto, (max-width: 590px) 100vw, 590px\" \/><\/a><\/p>\n<p>Launching this exploit on Windows with Reader 9.4.6 installed will crash and open the new document &#8220;2012 Federal Employee Pay Calender.pdf.&#8221;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-12955\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2011\/12\/13.png\" alt=\"\" width=\"736\" height=\"309\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2011\/12\/13.png 736w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2011\/12\/13-300x125.png 300w\" sizes=\"auto, (max-width: 736px) 100vw, 736px\" \/><\/p>\n<p>It spawns the new process pretty.exe and finally injects WSE4EF1.TMP into the iexplore.exe process, which connects to the control server.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/?attachment_id=12956\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-12956\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2011\/12\/14.png\" alt=\"\" width=\"736\" height=\"395\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2011\/12\/14.png 736w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2011\/12\/14-300x161.png 300w\" sizes=\"auto, (max-width: 736px) 100vw, 736px\" \/><\/a><\/p>\n<p>Looking at pretty.exe, we see that it looks for outlook.exe, iexplore.exe, and firefox.exe. It then injects the code into whichever process it finds open on the victim&#8217;s machine.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/?attachment_id=12957\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-12957\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2011\/12\/15.png\" alt=\"\" width=\"615\" height=\"280\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2011\/12\/15.png 615w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2011\/12\/15-300x136.png 300w\" sizes=\"auto, (max-width: 615px) 100vw, 615px\" \/><\/a><\/p>\n<p><strong><span style=\"text-decoration: underline;\">Network Communications<\/span><\/strong><\/p>\n<p>Once the code is injected into any of these open processes, a connection is made to the domain prettylikeher.com (IP: 72.30.2.43, which was resolved at execution) on port 443. Assuming that it must be using SSL for control, we hooked the WinInet.SecureSend and WinInet.SecureReceive APIs to check what was sent as the encrypted request. We found the following clear-text decrypted traffic:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/?attachment_id=12958\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-12958\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2011\/12\/16.png\" alt=\"\" width=\"736\" height=\"306\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2011\/12\/16.png 736w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2011\/12\/16-300x124.png 300w\" sizes=\"auto, (max-width: 736px) 100vw, 736px\" \/><\/a><\/p>\n<p>The server responded with HTTP 301. The location header had the HTTP link.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/?attachment_id=12959\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-12959\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2011\/12\/17.png\" alt=\"\" width=\"735\" height=\"140\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2011\/12\/17.png 735w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2011\/12\/17-300x57.png 300w\" sizes=\"auto, (max-width: 735px) 100vw, 735px\" \/><\/a><\/p>\n<p>Next the HTTP GET request initiated as shown below. The URI query string contains the hostname of the victim&#8217;s machine appended with the IP address.\u00a0The SSL and HTTP requests turned out to be the same.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/?attachment_id=12960\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-12960\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2011\/12\/18.png\" alt=\"\" width=\"735\" height=\"221\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2011\/12\/18.png 735w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2011\/12\/18-300x90.png 300w\" sizes=\"auto, (max-width: 735px) 100vw, 735px\" \/><\/a><\/p>\n<p><span style=\"text-decoration: underline;\"><strong>Analysis of the Injected DLL WSE4EF1.TMP<\/strong><\/span><\/p>\n<p>Looking at the injected DLL, the following code forms the HTTP GET request along with the URI query parameters:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/?attachment_id=12961\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-12961\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2011\/12\/19.png\" alt=\"\" width=\"736\" height=\"340\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2011\/12\/19.png 736w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2011\/12\/19-300x138.png 300w\" sizes=\"auto, (max-width: 736px) 100vw, 736px\" \/><\/a><\/p>\n<p>This DLL also seems be virtual-machine aware. While analyzing the code, we came across the VM check that is performed via the SIDT instruction.<\/p>\n<p>SIDT\u00a0\u00a0\u00a0 FWORD PTR SS:[EBP-8]<\/p>\n<p>EAX, DWORD PTR SS:[EBP-6]<\/p>\n<p>CMP\u00a0\u00a0\u00a0\u00a0 EAX, 8003F400<\/p>\n<p>JBE\u00a0\u00a0\u00a0\u00a0 SHORT WSE4EF1.10001C88<\/p>\n<p>CMP\u00a0\u00a0\u00a0\u00a0 EAX, 80047400<\/p>\n<p>JNB\u00a0\u00a0\u00a0\u00a0 SHORT WSE4EF1.10001C88<\/p>\n<p>Further analysis of the control code of the DLL reveals that the following commands can be run on the victim&#8217;s system:<\/p>\n<p>Cmd<\/p>\n<p>Shell<\/p>\n<p>Run<\/p>\n<p>Getfile<\/p>\n<p>Putfile<\/p>\n<p>Kill<\/p>\n<p>Process<\/p>\n<p>Reboot<\/p>\n<p>Time<\/p>\n<p>Door<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/?attachment_id=12962\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-12962\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2011\/12\/20.png\" alt=\"\" width=\"550\" height=\"461\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2011\/12\/20.png 550w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2011\/12\/20-300x251.png 300w\" sizes=\"auto, (max-width: 550px) 100vw, 550px\" \/><\/a><\/p>\n<p><span style=\"text-decoration: underline;\"><strong>McAfee Coverage for Exploit CVE-2011-2462 <\/strong><\/span><\/p>\n<p>McAfee Intrusion Prevention (formerly IntruShield) has released coverage for the exploit under the attack ID 0x402b1a00 HTTP: Adobe Reader and Acrobat U3D Memory Corruption Remote Code Execution. McAfee customers with up-to-date installations are protected against this malware.<\/p>\n<p><strong>Acknowledgments<\/strong><\/p>\n<p>I would like to thank my colleagues Hardik Shah, Swapnil Pathak, and Amit Malik for analyzing this vulnerability and contributing to this blog.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Recently a critical vulnerability has been identified in Adobe Reader X and Adobe Acrobat X Versions 10.1.1 and earlier for&#8230;<\/p>\n","protected":false},"author":674,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[338,180],"coauthors":[3973],"class_list":["post-12937","post","type-post","status-publish","format-standard","hentry","category-mcafee-labs","tag-endpoint-protection","tag-malware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Inside Adobe Reader Zero-Day Exploit CVE 2011-2462 | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Recently a critical vulnerability has been identified in Adobe Reader X and Adobe Acrobat X Versions 10.1.1 and earlier for Windows and Mac OS, Reader\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Inside Adobe Reader Zero-Day Exploit CVE 2011-2462 | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Recently a critical vulnerability has been identified in Adobe Reader X and Adobe Acrobat X Versions 10.1.1 and earlier for Windows and Mac OS, Reader\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/inside-adobe-reader-zero-day-exploit-cve-2011-2462\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2011-12-14T20:26:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-02T08:24:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2011\/12\/untitled1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"450\" \/>\n\t<meta property=\"og:image:height\" content=\"266\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/inside-adobe-reader-zero-day-exploit-cve-2011-2462\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/inside-adobe-reader-zero-day-exploit-cve-2011-2462\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"Inside Adobe Reader Zero-Day Exploit CVE 2011-2462\",\"datePublished\":\"2011-12-14T20:26:29+00:00\",\"dateModified\":\"2025-06-02T08:24:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/inside-adobe-reader-zero-day-exploit-cve-2011-2462\/\"},\"wordCount\":1055,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/inside-adobe-reader-zero-day-exploit-cve-2011-2462\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2011\/12\/untitled1.png\",\"keywords\":[\"endpoint protection\",\"malware\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/inside-adobe-reader-zero-day-exploit-cve-2011-2462\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/inside-adobe-reader-zero-day-exploit-cve-2011-2462\/\",\"name\":\"Inside Adobe Reader Zero-Day Exploit CVE 2011-2462 | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/inside-adobe-reader-zero-day-exploit-cve-2011-2462\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/inside-adobe-reader-zero-day-exploit-cve-2011-2462\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2011\/12\/untitled1.png\",\"datePublished\":\"2011-12-14T20:26:29+00:00\",\"dateModified\":\"2025-06-02T08:24:08+00:00\",\"description\":\"Recently a critical vulnerability has been identified in Adobe Reader X and Adobe Acrobat X Versions 10.1.1 and earlier for Windows and Mac OS, Reader\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/inside-adobe-reader-zero-day-exploit-cve-2011-2462\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/inside-adobe-reader-zero-day-exploit-cve-2011-2462\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/inside-adobe-reader-zero-day-exploit-cve-2011-2462\/#primaryimage\",\"url\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2011\/12\/untitled1.png\",\"contentUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2011\/12\/untitled1.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/inside-adobe-reader-zero-day-exploit-cve-2011-2462\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Inside Adobe Reader Zero-Day Exploit CVE 2011-2462\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Inside Adobe Reader Zero-Day Exploit CVE 2011-2462 | McAfee Blog","description":"Recently a critical vulnerability has been identified in Adobe Reader X and Adobe Acrobat X Versions 10.1.1 and earlier for Windows and Mac OS, Reader","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Inside Adobe Reader Zero-Day Exploit CVE 2011-2462 | McAfee Blog","og_description":"Recently a critical vulnerability has been identified in Adobe Reader X and Adobe Acrobat X Versions 10.1.1 and earlier for Windows and Mac OS, Reader","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/inside-adobe-reader-zero-day-exploit-cve-2011-2462\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2011-12-14T20:26:29+00:00","article_modified_time":"2025-06-02T08:24:08+00:00","og_image":[{"width":450,"height":266,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2011\/12\/untitled1.png","type":"image\/png"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/inside-adobe-reader-zero-day-exploit-cve-2011-2462\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/inside-adobe-reader-zero-day-exploit-cve-2011-2462\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"Inside Adobe Reader Zero-Day Exploit CVE 2011-2462","datePublished":"2011-12-14T20:26:29+00:00","dateModified":"2025-06-02T08:24:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/inside-adobe-reader-zero-day-exploit-cve-2011-2462\/"},"wordCount":1055,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/inside-adobe-reader-zero-day-exploit-cve-2011-2462\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2011\/12\/untitled1.png","keywords":["endpoint protection","malware"],"articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/inside-adobe-reader-zero-day-exploit-cve-2011-2462\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/inside-adobe-reader-zero-day-exploit-cve-2011-2462\/","name":"Inside Adobe Reader Zero-Day Exploit CVE 2011-2462 | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/inside-adobe-reader-zero-day-exploit-cve-2011-2462\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/inside-adobe-reader-zero-day-exploit-cve-2011-2462\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2011\/12\/untitled1.png","datePublished":"2011-12-14T20:26:29+00:00","dateModified":"2025-06-02T08:24:08+00:00","description":"Recently a critical vulnerability has been identified in Adobe Reader X and Adobe Acrobat X Versions 10.1.1 and earlier for Windows and Mac OS, Reader","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/inside-adobe-reader-zero-day-exploit-cve-2011-2462\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/inside-adobe-reader-zero-day-exploit-cve-2011-2462\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/inside-adobe-reader-zero-day-exploit-cve-2011-2462\/#primaryimage","url":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2011\/12\/untitled1.png","contentUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2011\/12\/untitled1.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/inside-adobe-reader-zero-day-exploit-cve-2011-2462\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"Inside Adobe Reader Zero-Day Exploit CVE 2011-2462"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/12937","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=12937"}],"version-history":[{"count":2,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/12937\/revisions"}],"predecessor-version":[{"id":214817,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/12937\/revisions\/214817"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=12937"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=12937"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=12937"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=12937"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}