Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Applications
    • Applications
    • Cybersecurity
    • IT Management

    Critical Zero-Day PDF Bug Compromises Windows PCs

    Written by

    Lisa Vaas
    Published September 20, 2007
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      A zero-day PDF vulnerability in Adobes Acrobat Reader has come to light that can lead to Windows boxes getting taken over completely and invisibly, according to a security researcher.

      “All it takes is to open a [maliciously rigged] PDF document or stumble across a page which embeds one,” said researcher Petko D. Petkov, aka pdp, in a blog posting on Sept. 20.

      Petkov said hes closing the season with this highly critical flaw—a season thats included, at least in the past two weeks, his discovery of a slew of serious vulnerabilities in meta media files: a QuickTime flaw that can be used to hijack Firefox and Internet Explorer; a simple method of loading HTML files into Windows Media Player files; and an easy, six-step method by which to penetrate Second Life accounts with an IE bug.

      This PDF vulnerability is even worse than the QuickTime flaw, Petkov said. Mozilla provided a Firefox workaround for the QuickTime flaw earlier the week of Sept. 17, but it can still be used to compromise Internet Explorer, as security researcher Thor Larholm demonstrated in a posting on Sept. 19. Apple hasnt yet released any details on the status of a QuickTime fix.

      Paul Henry, vice president of technology and evangelism at Secure Computing, based in San Jose, Calif., said in an interview with eWEEK that PDF vulnerabilities have a strong advantage when it comes to users being tempted into opening them, giving this vulnerability the potential to become a “huge” attack vector. “From a social engineering standpoint, its easier to attach a PDF to e-mail and assume [the target will] open it. If youve got a request to launch a video conversation from someone you never heard of, chances are you wont do it. Or you wont click on a video online if you dont know where its from. But from a social engineering point of view, this is deeper.”

      For its part, Symantec, based in Cupertino, Calif., on Sept. 20 warned customers using its DeepSight Alert Services that Adobe Acrobat is subject to “an unspecified vulnerability when handling malicious PDF files,” allowing remote users to take over targeted machines.

      The scenario is that an attacker rigs a PDF file designed to exploit the flaw. He or she distributes it via e-mail or through other means, or hosts it on a Web page. When a user opens the rigged PDF file with a vulnerable application, the users machine can be loaded with malware that makes it open to a takeover.

      Symantec said its not aware of any working exploits out yet.

      Still, Henry warned, the PDF threat is real. “The ability to use PDFs to install malware and steal personal information from remote PCs is here,” he said in a statement. “Readers should be cautioned to only open PDF files from senders they explicitly trust.”

      Given that this latest meta media file flaw with PDF documents is so critical, given also that PDFs are used throughout the business world, and given the fact that he expects Adobe will take a while to fix its closed-source product, Petkov said hes refraining from publishing any POC (proof-of-concept) code.

      “You have to take my word for it. The POCs will be released when an update is available,” he said.

      This has miffed some. “If you have nothing else to publish than Please dont open PDF Docs, but I cant tell you why, it would be a better choice [to] shut up instead [of] bringing no information,” wrote somebody with the handle of Jan Heisterkamp.

      Page 2: Zero-Day PDF Bug Compromises Windows

      Zero

      -Day PDF Bug Compromises Windows”>

      Others are willing to take Petkovs word that the flaw is too critical for a POC. As it is, Petkovs credibility is shored up in no small part by five PDF POCs he put out in January.

      One of those PDF vulnerability POCs automatically opened a folder displaying the victims c: drive on his desktop; another displayed the file path to the temporary stored PDF and revealed the user name; and Petkov also posted self-contained, local, Universal PDF XSS (cross-site scripting) flaws: one for Internet Explorer, one for Firefox and one for Opera.

      In spite of Petkovs having refrained from putting out a POC for the latest PDF flaw, somebodys sure to piece together an exploit or POC out of the other five, Henry said.

      “Everybody and his brother has the other five POCs he put together. With a little tweaking Im sure theyll put them together pretty quickly,” he said. “I would have to assume [the six PDF vulnerabilities are related]. Hes done a lot of work attaching JavaScript to media files. We have to assume this latest trick involves a change in something with the media files, with JavaScript. Its not rocket science.”

      Henry said Secure Computing, for one, has been sounding the alarm about PDF since Petkovs original postings.

      “We raised the flag in January when [Petkov] discovered the initial [PDF] vulnerabilities and publicly released the POC code,” he said. “Shortly after that we saw a huge upsurge in PDF attachments in spam. We all have to be cognizant that the POC is out there for potential vulnerabilities. This would be a very good vehicle for malicious guys to move code into our networks.”

      Adobe, also based in San Jose, said within the past few weeks that the five vulnerabilities in the January POCs represented a low threat risk. But with Petkovs most recent finding, Henry said, “We see an announcement that at least this current version is absolutely not low risk.”

      “I think this will create problems for us,” Henry said. “Im [warning] people … plans need to be put in place to quickly raise awareness in the organization that there might be a risk in PDF files. Were informing users to not open files that a) come from someone they dont know and b) they arent expecting.”

      Petkov wrapped up his most recent, most terse PDF posting by telling Adobes representatives that they can contact him “from the usual place.”

      Adobe issued a statement on the evening of Sept. 20 saying that its aware of Petkovs post, has been in communication with him and is researching the potential issue. Adobe will update users on its Adobe Security Bulletins and Advisories page. Also, the statement said, all documented security vulnerabilities and their solutions are distributed through the Adobe security notification service.

      Petkovs advice is to keep away from PDF files, local or remote. He said other viewers besides Adobes Acrobat Reader might be vulnerable as well. He has verified the PDF issue on Windows XP Service Pack 2 with the latest Adobe Reader 8.1, although previous versions are also affected, he said.

      Check out eWEEK.coms Security Center for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEKs Security Watch blog.

      Lisa Vaas
      Lisa Vaas
      Lisa Vaas is News Editor/Operations for eWEEK.com and also serves as editor of the Database topic center. She has focused on customer relationship management technology, IT salaries and careers, effects of the H1-B visa on the technology workforce, wireless technology, security, and, most recently, databases and the technologies that touch upon them. Her articles have appeared in eWEEK's print edition, on eWEEK.com, and in the startup IT magazine PC Connection.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×