Skip the navigation

Reader X spoils new PDF attack

But researchers are unsure whether Adobe's new sandbox helped block attack

February 4, 2011 01:39 PM ET

Computerworld - Adobe's Reader X, last year's upgrade that features a "sandbox" designed to protect users from PDF exploits, stymied a recent attack campaign, researchers said Thursday.

But they're not sure why.

"I don't want to take anything away from Adobe -- after all, a win is a win -- but this particular exploit appears to be designed with previous versions of Reader in mind," said Chris Greamo, who heads the research lab at security company Invincea of Fairfax, Va. "What appears to have happened is that the exploit breaks, but we don't have a good sense if the sandbox was able to contain it."

Meanwhile, engineers at U.K.-based Sophos poked into the malware -- a malicious PDF document that's attached to spam -- and found that Reader X stops its execution. The same malware, which first was noticed by security firms last October, runs correctly when aimed at Adobe Reader 8, however.

The malformed PDF tries to exploit an already-patched vulnerability in older versions of Reader, said Chet Wisniewski, a senior security adviser with the antivirus company.

Like Greamo, Wisniewski wasn't able to definitively credit Reader X's sandbox for blocking the attack. "Was it the sandbox or that the malware was designed for Reader 8 and 9, not Reader X? I have a hunch it was both, really," Wisniewski said.

It's not unusual for malware to fail when run on, say, a different edition of Windows than what it was meant to attack, or to crash when encountering a newer version of the target application, even if the security vulnerability still exists in the update.

"[This malware] wouldn't have worked in any case, because the flaw it exploits only exists in older versions of Reader," Wisniewski said. "But even if it had, considering what the exploit had to do, the sandbox in Reader X would have provided protection."

At a minimum, Reader X is a win for Adobe, Wisniewski continued, because that version had eliminated the flaw.

Adobe said it had reached out to Sophos for more details about the malware to determine what vulnerability was targeted, and couldn't confirm that Reader X's sandbox had played a part.

"However, based on the description of the exploit, specifically that it attempts to download and run malicious code, we know the sandbox design seeks to prevent this type of action from happening, even if the vulnerability were present in the Adobe Reader X code base," said an Adobe spokeswoman in an e-mail reply to questions.

The spokeswoman added that no vulnerabilities that could be used to escape the sandbox have been reported to Adobe since Reader X debuted last November. "Nor have we seen any public discussion of sandbox-breaking exploits," she said.



Our Commenting Policies
Internet of Things: Get the latest!
Internet of Things

Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!