Adobe Reader Update Installs Chrome Extension

The latest update to the Adobre Acrobat Reader has been revealed to install a Chrome extension which features an anonymous data collection feature activated by default.

Data Collecting Chrome Extension Installed By Adobe Reader Update

Adobe released a new security update to their Adobe Reader which is probably the most popular PDF documents viewer. However security experts were surprised to discover that in the iteration of the program Adobe have also bundled a new Adobe Acrobat extension that is automatically installed to the Google Chrome web browser. The disturbing fact is that there is no mention of this in the official changelog.

There are two security bulletins which attribute various important fixes.

Adobe Security Bulletin APSB17-01

The released patches that are part of this bundle are updated on January 10 and address vulnerabilities for the Adobe Acrobat and Reader software for both the Microsoft Windows and Mac OS X operating systems.

Vulnerability Details:

  • These updates resolve a type confusion vulnerability that could lead to code execution (CVE-2017-2962).

  • These updates resolve use-after-free vulnerabilities that could lead to code execution (CVE-2017-2950, CVE-2017-2951, CVE-2017-2955, CVE-2017-2956, CVE-2017-2957, CVE-2017-2958, CVE-2017-2961).

  • These updates resolve heap buffer overflow vulnerabilities that could lead to code execution (CVE-2017-2942, CVE-2017-2945, CVE-2017-2946, CVE-2017-2949, CVE-2017-2959, CVE-2017-2966).

  • These updates resolve buffer overflow vulnerabilities that could lead to code execution (CVE-2017-2948, CVE-2017-2952).

  • These updates resolve memory corruption vulnerabilities that could lead to code execution (CVE-2017-2939, CVE-2017-2940, CVE-2017-2941, CVE-2017-2943, CVE-2017-2944, CVE-2017-2953, CVE-2017-2954, CVE-2017-2960, CVE-2017-2963, CVE-2017-2964, CVE-2017-2965, CVE-2017-2967).

  • These updates resolve a security bypass vulnerability (CVE-2017-2947).

Adobe Security Bulletin APSB17-02

The second updates bundle resolves 13 security issues in Adobe Flash Player for Windows, Gnu/Linux distributions, Chrome OS and Mac OS X.

  • These updates resolve a security bypass vulnerability that could lead to information disclosure (CVE-2017-2938).

  • These updates resolve use-after-free vulnerabilities that could lead to code execution (CVE-2017-2932, CVE-2017-2936, CVE-2017-2937).

  • These updates resolve heap buffer overflow vulnerabilities that could lead to code execution (CVE-2017-2927, CVE-2017-2933, CVE-2017-2934, CVE-2017-2935).

  • These updates resolve memory corruption vulnerabilities that could lead to code execution (CVE-2017-2925, CVE-2017-2926, CVE-2017-2928, CVE-2017-2930, CVE-2017-2931).

The Data Collecting Chrome Extension Is Bundled In The Latest Adobe Reader Updates

Once the users installs the latest updates they will receive the new browser extension on their Google Chrome Web Browser. It is named Adobe Acrobat and is the same one that is available on the browser’s Web Store. It’s description reads the following:

Convert current web page to an Adobe PDF file (Windows only)

Convert web pages to PDF files

NOTE:

THIS IS A WINDOWS ONLY EXTENSION

Adobe Acrobat DC/Adobe Acrobat XI (11.0.09 or higher) must be installed on your machine

With the Adobe Acrobat extension for Chrome, it’s easy to convert web pages to rich, high-quality PDF files that maintain the look and feel of the original content.

KEY FEATURES

Easily turn web pages into PDF files that look just like the page you converted

Preserve the layout, formatting, and links of captured pages – including CSS styles, HTML5 tags, JavaScript, embedded Flash, and more

Quickly switch from viewing PDFs in Chrome to opening them in Acrobat on your desktop

Explore Adobe Document Services to convert and combine files in your browser

Your use of this extension is governed by the Acrobat DC End User License Agreement (

By default the add-on enables anonymous usage data collection by default. The following information is collected:

  • Browser type and version
  • Adobe product information such as version
  • Adobe feature usage such as menu options or buttons selected

Fortunately when the users open up their Google Chrome browsers after the security update they are presented with a pop-up that asks for their permission before the extension is activated.

Was this content helpful?

Author : Martin Beltov

Martin graduated with a degree in Publishing from Sofia University. As a cyber security enthusiast he enjoys writing about the latest threats and mechanisms of intrusion.


Related Posts