Use EMET 2.0 to block Adobe Reader and Acrobat 0-day exploit

FSOwner

FS Owner
As you probably know there is a new exploit in the wild for Adobe Reader and Acrobat. This particular exploit is using the Return Oriented Programming (ROP) exploit technique in order to bypass Data Execution Prevention (DEP).

[...] The good news is that if you have the Enhanced Mitigation Experience Toolkit 2.0 (EMET) enabled for AcroRd32.exe, it blocks this exploit. This happens thanks to two different mitigations...

view.gif
View Full Article: Microsoft Security Research & Defense Blog (via PCMag.com)
 
Back
Top