Adobe fails to fully fix PDF bug
Plugs only part of the hole disclosed in March; may return for a second try at patching
Computerworld - An Adobe patch for a well-publicized bug in the company's Reader PDF software doesn't fix the vulnerability, the security researcher who uncovered the flaw confirmed.
Last Tuesday, Adobe shipped an update for Reader and Acrobat, its popular PDF-viewing and -creation programs, that patched 17 vulnerabilities, including a design issue that gave attackers an easy way to con users into running malware. The bug, which was disclosed by Belgian researcher Didier Stevens in late March, allowed hackers to leverage the "/Launch" function, a feature that executes other software from within a PDF document.
When combined with another trick -- Stevens also showed how a Reader warning could be changed to further fool users -- the flaw could be used to dupe users into launching malware masquerading as legitimate software.
Hackers have been using Stevens' technique in mass attacks to infect Windows PCs since mid-April.
On Sunday, Stevens confirmed that the patch didn't fix the flaw. In a post to his blog on July 4, he wrote:
I did some research and discovered that Adobe implemented a blacklist of extensions for the launch action, but that the blacklisting functionality identifies the file type of "cmd.exe" as .exe", and not .exe
Attackers can still get a PDF document to run malware simply by enclosing the malicious filename within single or double quotation marks, Stevens said.
Le Mahn Tung, a researcher at Bach Khoa Internetwork Security, which is housed at the Hanoi University of Technology in Vietnam, first noticed that Adobe had not properly patched the bug.
On his blog, Stevens offered a work-around to deflect attacks that sidestep Adobe's blacklist. His work-around, however, involves editing the Windows registry, a task most users will shy away from.
Adobe acknowledged that its blacklist wasn't foolproof and said it was looking into Tung's and Stevens' bypass techniques.
"While blacklist capabilities alone are not a perfect solution to defend against those with malicious intent, this option reduces the risk of attack," said Brad Arkin, Adobe's director of security and privacy, in an entry on the security team's blog. "We will evaluate [the Tung] workaround to determine whether additional changes to the blacklist are required."
Adobe fixed the warning dialog flaw, Stevens noted, so that hackers could not modify it to increase the chance that users would fall for their ploys. Adobe's Arkin also pointed that out. "The warning message provided includes strong wording advising users to only open and execute the file if it comes from a trusted source," Arkin said.
Last week's patch also modified Reader and Acrobat so that the /Launch feature is disabled by default, requiring users who want the functionality to manually switch it on. In earlier editions, /Launch was enabled by default.
The updated Reader and Acrobat for Windows, Mac and Linux can be downloaded using the links included in the security advisory Adobe published last week. Alternately, users can run the programs' built-in update mechanism to grab the new versions.
Gregg Keizer covers Microsoft, security issues, Apple, Web browsers and general technology breaking news for Computerworld. Follow Gregg on Twitter at @gkeizer or subscribe to Gregg's RSS feed . His e-mail address is firstname.lastname@example.org.
Read more about Application Security in Computerworld's Application Security Topic Center.
- Gartner Magic Quadrant for Client Management Tools The client management tool market is maturing and evolving to adapt to consumerization, desktop virtualization, and an ongoing need to improve efficiency.
- Audit Ready and Asset Optimized: The Solid Promise of an Intelligent Software Asset Management Solution In this paper Frost & Sullivan examines the benefits of enterprise-grade Software Asset Management solutions, and how these solutions serve as the convergence...
- Gartner Magic Quadrant for Application Security The market for application security testing is changing rapidly. Technology trends, such as mobile applications, advanced Web applications and dynamic languages, are forcing...
- Five Steps to Achieve Success in your Application Security Program This white paper provides a general framework your organization can use to create or build upon an application security program. It includes guidelines...
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Application Security White Papers | Webcasts