http://arstechnica.com/security/2012/11/zero-day-attack-reportedly-pierces-key-adobe-reader-defense/
Well you maybe better off with the Win8 reader than either Foxit or Adobe Reader. Hopefully, the sandbox has been hardened in abobe's reader such that another 0 day exploit doesn't come around for a long long time.
I jinxed Adobe's track record, here's a new report via FireEye:
http://blog.fireeye.com/research/2013/02/in-turn-its-pdf-time.html
No word on whether the exploit can function in Reader's Protected View. But if it does what it says there (dropping malicious DLLs), then Software Restriction Policy would probably stop it, assuming it's been properly set up to watchdog all files including DLLs.
Another worthwhile tweak: enforce the DLL Search Order to prohibit using the "current working directory." For those so inclined,
1. scroll down to the Update Information page here, and get the update for your version of Windows:
http://support.microsoft.com/kb/2264107
2. after installing the update, now run the Fix-It above the Update Information section.
3. after installing the update and then running the Fix-It, now barge into the Registry with regedit.exe and set
CWDIllegalInDLLSearch to
ffffffff (that's eight Fs). After saving that change, it'll show up as 0xffffffff, which is correct.
4. if you have software that freaks out at this enforcement, you can make exemptions. Under
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\, add a new key named for the offending executable file, then add a DWORD named CWDIllegalInDllSearch in that key and set the value to 0 for compete exemption, or 2 if it'll tolerate that. Myself, I have a couple older programs that'll lock up during launch if I don't make an exception for them.
Once in a while I read about malware that does abuse the DLL-search order, so if you have a case of securinoia, try this out
