Adobe: Hacker 'spotlight' will shine on Reader X's sandbox

But firm's security exec is certain the sandbox will make PDF attacks passé

Adobe's chief security executive said that there will be a bull's-eye on Reader X when the new version ships next month.

Adobe Reader X, slated for release in the next 30 days, will feature Protected Mode, a "sandbox" technology that isolates processes, preventing or at least hindering malware from escaping an application to wreak havoc on the computer.

Security researchers and experts have long called for Adobe to add sandboxing to Reader because of its many vulnerabilities, which have made it a popular route to PC infection. They're getting what they asked for in November.

But Brad Arkin, Adobe's director of security and privacy, acknowledged that Protected Mode won't stop attacks against the popular PDF viewer. In fact, it will probably encourage researchers to redouble their efforts to identify security holes, at least initially.

"We're going to have the spotlight of the security researcher community on us when Reader X launches," Arkin said. "Everyone will want bragging rights to be the first to come up with a working exploit of the sandbox."

But Arkin was confident that Reader X will withstand the inevitable assaults.

"We have a lot of confidence that we've leveraged the positive aspects of the best technologies," he said, referring to the work on sandboxing by both Google and Microsoft that Adobe used to construct its defenses.

In Reader X, all PDF rendering chores will take place within the sandbox, which severely limits the application's privileges in order to cut it off from the rest of the system. Any malicious code packed into a rogue PDF would still run, but it should not be able to escape the isolation chamber.

A separate "broker" decides which functions Reader can conduct outside the sandbox, such as writing to disk or launching an attachment or executable file from within the software.

The key to Protected Mode, Arkin acknowledged, is the broker. Hack the broker, and attackers will still be able to infect machines using rigged PDFs.

"The broker is 13,000 lines of code -- brand-new modern code that's been exhaustively tested and gone through Secure Product Lifecycle," said Arkin, referring to Adobe's development strategy that, like Microsoft's better-known Software Development Lifecycle, mandates that programmers follow security-specific steps to reduce possible vulnerabilities.

"That code has had more security attention than any other like-sized code in the history of the company," Arkin said. "We've had multiple sets of eyeballs on it to make sure we didn't have groupthink going on here."

Adobe tested the broker specifically and the sandbox in general, both inside the company and with a limited number of enterprise customers that use Reader. The company also hired outside researchers, who tried to break out of the sandbox, but Arkin declined to specify the results.

"The sandbox was not perfect the first day we had it working," he acknowledged. "We found things during the testing and adapted [the sandbox]."

Adobe also flung exploits that had worked on earlier editions of Reader against testing versions of Reader X that had been tweaked to include older vulnerabilities. "In 100% of the cases, the sandbox stopped the exploit from infecting the PC," said Arkin.

But while Arkin sounded confident that the sandbox in Reader X can withstand attacks, realistically the technology is simply another hurdle in front of hackers.

"We think that a successful exploit of Reader X will have to be a multistaged attack," said Arkin. "The first stage would be against the PDF rendering [in the sandbox], with the second stage necessary to leverage [a vulnerability] in the sandbox. That makes it harder for attackers, and exploit reliability will also be diminished because of the complexity."

One noted vulnerability and exploit researcher agreed that the complexity inherent in breaking out of a sandbox might be enough to keep most attacks at arm's length.

"I think it accomplishes its goal, which is to make researchers look for something easier to attack," said Charlie Miller, a researcher at Baltimore-based Independent Security Evaluators, in an e-mail reply to questions about sandboxing. "I don't really see the point in looking for a Reader bug and a sandbox bug, when I could just find some other easier way to break into a system."

Adobe plans to urge Reader 8 users to upgrade to Reader X shortly after the new version's launch but will hold off on notifying Reader 9 users of the upgrade. "We want to roll over the older segment of the Reader user base first," Arkin said. "I would like to do both [Reader 8 and Reader 9 update notifications] within the first 12 months of X's release."

Gregg Keizer covers Microsoft, security issues, Apple, Web browsers and general technology breaking news for Computerworld. Follow Gregg on Twitter at @gkeizer or subscribe to Gregg's RSS feed . His e-mail address is gkeizer@computerworld.com.

FREE Computerworld Insider Guide: IT Certification Study Tips
Join the discussion
Be the first to comment on this article. Our Commenting Policies