Reader X spoils new PDF attack
But researchers are unsure whether Adobe's new sandbox helped block attack
Computerworld - Adobe's Reader X, last year's upgrade that features a "sandbox" designed to protect users from PDF exploits, stymied a recent attack campaign, researchers said Thursday.
But they're not sure why.
"I don't want to take anything away from Adobe -- after all, a win is a win -- but this particular exploit appears to be designed with previous versions of Reader in mind," said Chris Greamo, who heads the research lab at security company Invincea of Fairfax, Va. "What appears to have happened is that the exploit breaks, but we don't have a good sense if the sandbox was able to contain it."
Meanwhile, engineers at U.K.-based Sophos poked into the malware -- a malicious PDF document that's attached to spam -- and found that Reader X stops its execution. The same malware, which first was noticed by security firms last October, runs correctly when aimed at Adobe Reader 8, however.
The malformed PDF tries to exploit an already-patched vulnerability in older versions of Reader, said Chet Wisniewski, a senior security adviser with the antivirus company.
Like Greamo, Wisniewski wasn't able to definitively credit Reader X's sandbox for blocking the attack. "Was it the sandbox or that the malware was designed for Reader 8 and 9, not Reader X? I have a hunch it was both, really," Wisniewski said.
It's not unusual for malware to fail when run on, say, a different edition of Windows than what it was meant to attack, or to crash when encountering a newer version of the target application, even if the security vulnerability still exists in the update.
"[This malware] wouldn't have worked in any case, because the flaw it exploits only exists in older versions of Reader," Wisniewski said. "But even if it had, considering what the exploit had to do, the sandbox in Reader X would have provided protection."
At a minimum, Reader X is a win for Adobe, Wisniewski continued, because that version had eliminated the flaw.
Adobe said it had reached out to Sophos for more details about the malware to determine what vulnerability was targeted, and couldn't confirm that Reader X's sandbox had played a part.
"However, based on the description of the exploit, specifically that it attempts to download and run malicious code, we know the sandbox design seeks to prevent this type of action from happening, even if the vulnerability were present in the Adobe Reader X code base," said an Adobe spokeswoman in an e-mail reply to questions.
The spokeswoman added that no vulnerabilities that could be used to escape the sandbox have been reported to Adobe since Reader X debuted last November. "Nor have we seen any public discussion of sandbox-breaking exploits," she said.
- Mobile First: Securing Information Sprawl Learn how the partnership between Box and MobileIron can help you execute a "mobile first" strategy that manages and secures both mobile apps...
- Cybersecurity Imperatives: Reinvent your Network Security The Rise of CyberSecurity
- Surescripts Case Study- Securing Keys and Certificates Surescripts implemented Venafi's Trust Protection Platform™ to secure digital keys and certificates, ensure the privacy and confidentiality of electronic clinical information for its...
- Ponemon 2014 SSH Security Vulnerability Report According to research by the Ponemon Institute, 3 out of 4 enterprises have no security controls in place for SSH which leaves organizations...
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities.
- Deep Dive into Advanced Networking and Security with Hybrid Cloud Security and networking are among the top concerns when moving workloads to the cloud. VMware vCloud® Hybrid Service™ enables you to extend your... All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!