No User Action Required In Newly Discovered PDF Attack
March 10, 2009 – 4:43 AMMerely storing — without opening — a malicious PDF file can trigger an attack that exploits the new, unpatched zero-day flaw in Adobe Reader, a researcher has discovered. Didier Stevens, a researcher and IT security consultant with Contrast Europe NV, today released a proof-of-concept demonstration that shows how a file infected with the Adobe flaw can trigger a new attack when the machine uses Windows Indexing Services. And the user doesn’t even have to open or select the document.
In addition, Stevens last week released a proof-of-concept demonstrating how PDF files could be exploited with minimal user interaction — just saving it to the hard drive and viewing it in Windows Explorer.
But this latest attack vector is more risky, he says, because the user doesn’t have to do anything with the file at all. “It requires no user interaction, and for the Windows Indexing Service, it can lead to total system compromise [with] privilege escalation,” Stevens says.
Windows Indexing Service is an operating system-level feature that provides an index of files on the system.
Adobe first reported the buffer overflow flaw in Adobe Reader and Acrobat on Feb. 20; initially, security experts advised disabling JavaScript in order to defend against any attacks that exploited the vulnerability. But after further research on the vulnerability, it turns out disabling JavaScript isn’t always enough. “The vulnerability is not in the scripting engine, and, therefore, disabling JavaScript does not eliminate all risk,” Adobe said in a blog post.
Source:
http://www.darkreading.com/security/attacks/showArticle.jhtml?articleID=215801319&cid=RSSfeed
You must be logged in to post a comment.