Adobe PDF security issues

Adobe PDF Security Issues

Adobe PDF Security Issues, Acrobat Vulnerabilities, PDF Cracks

Acrobat PDF security issues, ebook vulnerabilities, cracks, flaws

Information on security issues, vulnerabilities, flaws and cracks in Adobe PDF and PDF Security products.

Covers PDF Security issues for other companies using the Adobe PDF plug-in / security handler and how they have been compromised.  PDF ebook security flaws are also covered as well as third party PDF DRM suppliers.

For an up to date list of Adobe Reader security advisories please see Adobe’s web site.

PDF Security Issues, PDF & Ebook Weak Implementations

Bypassing Adobe Security controls on the Mac

This paper explains how to bypass Adobe PDF Security using a Mac computer.

How the Adobe PDF Security Handler works

“Adobe’s PDF protection scheme is a classic example of security through obscurity.  They encrypt the content of a PDF file and hope that no one figures out how to decrypt it.”  This paper explains how Adobe encrypts PDF files.

10 things you really wished you had known about PDF DRM, but they didn’t tell you

This paper explains the current pitfalls of PDF security.  If the PDF security solution you decide on can be circumvented by simple means, or is complex to setup and use then you might want to look elsewhere.

PDF Security plug-in vulnerabilities

If you think PDF plug-ins can’t compromise your security then perhaps you should read this.

How Secure Is PDF?

This paper discusses the flaws in the Acrobat Standard Security handler.

PDF Security and Malware

This paper covers the security analysis of the PDF format and malware attacks.  It shows why it is essential that JavaScript is disabled in Acrobat if you want to protect yourself against malware attacks.

Malicious PDFs – How do PDF attacks work

Adobe says “One of the easiest and most powerful ways to customize PDF files is by using JavaScript” but it can leave systems open to easy attacks.  This article covers how PDF files execute code, JavaScript security issues, and how login credentials can be easily stolen.

Analysis of E-book Security

This paper makes a survey on main e-book standards, application architectures and security mechanisms.  The security strength and weakness of the investigated e-book systems are analyzed and presented.

Adobe Digital Editions Digital Rights Management

Adobe has been plagued with poor implementations of DRM security for PDF files and EPUB ebooks and reports of spying on user activity.  In 2009 Adobe Digital Editions DRM was broken by i♥cabbages allowing users to remove the DRM protection from Adobe ebooks – “There is very little obfuscation in how Adobe Digital Editions hides and encrypts the per-user RSA key, allowing fairly simple duplication of exactly the same process Digital Editions uses to retrieve it.”.  Adobe announced a strengthening of their DRM system in 2014 but there are many ebook DRM removal companies claiming to easily remove Adobe Digital Editions DRM.

PDF Encryption & Digital Signature Weaknesses

PDF Encryption – there is no integrity protection.  An attacker can modify the structure of encrypted PDF documents, add unencrypted objects, or wrap encrypted parts into a context controlled by the attacker.  Since the PDF specification allows the mixing of ciphertexts with plaintexts, this can be used in combination with other PDF features which allow the loading of external resources via HTTP, enabling an attacker to run direct exfiltration attacks to gain access to the PDF content once a victim opens a PDF file.

PDF Digital Signatures – due to weaknesses in signature validation algorithms, PDF documents can be altered without them being reported as tampered with.  PDFs can also be altered after signing to trick PDF viewers into displaying content that looks different to the one that was signed.

Removing passwords from PDF files

Whilst most people know that removing PDF passwords is trivial using freely available PDF password cracking tools, you may not know that standard Google applications also provide this functionality.  The reason PDF restrictions password removal is so simple is that Adobe relies on the honor system for PDF password security (i.e. please obey the restrictions placed on this document).

See also:

   Adobe Acrobat PDF Security Vulnerabilities

PDF Digital Signatures broken again with two new attacks

Two new attacks – called Sneaky Signature Attack (SSA) and Evil Annotation Attack (EAA) – enabled researchers to display fake content in a signed Adobe PDF document instead of the certified content, without rendering the certification invalid or triggering a warning from the PDF applications.

Out of 26 PDF applications tested, in 24 were vulnerable to attack.  11 applications even had PDF certification specifications implemented incorrectly.

The researchers also found that certified Adobe documents can execute JavaScript code, such as accessing URLs to verify the identity of a user – attackers could use this mechanism to add malicious code to a certified PDF document.

PDF Digital Signatures proven to be totally useless
Digital signatures applied to PDF documents (designed to check if changes to a PDF have been made) cannot be relied upon since you can manipulate digitally signed PDFs without the documents being reported as tampered with.

Encrypted PDF content can be viewed by a hacker without the need for a password or key
Encrypted PDF files can be modified by an attacker even if they don’t have the key to open it.  This is because the PDF standard lets you mix encrypted and plain text in a PDF file.  As soon as the file is opened and decrypted by the user, the content is sent to the attacker.

PDF security flaw let’s hackers view password protected PDF files
Hackers can unlock and read the content of an encrypted PDF without knowing the password.  The attack takes advantage of security weaknesses in the standard encryption protection built into the PDF format.

PDF files available to all in Apple’s News Magazine Subscription Service
Apple preloads the first few pages of PDF magazine issues whether you have paid for a subscription or not.  You can then find the document in your browser cache and reconstitute the complete original PDF file.

Hackers collect user data via PDF files viewed in Chrome
The vulnerability allows attackers to harvest sensitive data using malicious PDF documents opened in Chrome.

Adobe address PDF security issues with new updates
Adobe Reader updates have been made available to address remote code execution and information disclosure.

Foxit PDF security flaws exposes remote attacks
Security issues in Foxit’s PDF Reader enable a remote attacker to execute arbitrary code by running unauthorized and malicious JavaScript on a user’s computer.

Acrobat Reader information disclosure vulnerability
A vulnerability in Acrobat Reader could allow an attacker to access sensitive information via a user opening a malicious document.  This could trigger a memory address leak that the attacker could leverage to access sensitive information.

Kobo upgrade deprives readers of hundreds of DRM-locked ebooks
Customers have reported losing e-books from their libraries after having upgraded to the latest version of Adobe Digital Editions.

Access being denied to PDF documents and ebooks after an Adobe update is not new.  Companies that have implemented the Acrobat PDF DRM plugin have also had furious customers unable to access protected PDF files since every time Acrobat is updated the PDF DRM plugin no longer works.

Latest security issues affects Adobe Acrobat and Digital Editions
Adobe has released security updates to address multiple vulnerabilities in Acrobat, Reader, and Digital Editions.  Exploitation of some of these vulnerabilities may allow a remote attacker to take control of an affected system. Updates have been released in both March and May addressing the same security issues.

PDF malware demands ransoms
The latest version of CryptoWall 3.0, the dominant ransomware used by attackers, is included in yet another email campaign targeting both individuals and companies.  The malware gets on user’s computers via a resume.PDF file.

Malicious PDF files served to unknowing users
Scammers are using redirecting websites and cloaking in order to bypass Google filters and present users with malicious PDF files.

PDF documents under attack from embedded files
Attackers are embedding malicious .doc files inside PDF files in order to infect host computers.

Adobe Acrobat PDF Security Issues – 2011-2014

Why is Adobe Acrobat Reader so insecure?
Adobe’s efforts to update Acrobat have made it more insecure with regular security flaws being exploited by attackers to download malware to user’s computers.

Users Amazon account exposed by Kindle ebooks vulnerability
A vulnerability in eBooks is found that, when the infected eBook is launched on an Amazon Kindle device, can lead to attackers taking control of the user’s Amazon account.

Adobe PDF DRM ebooks obsolete
Adobe planned to update their PDF and eBook DRM procedure in July, rendering all previous eBook readers and protected documents obsolete.  This meant that publishers had to update their entire libraries and millions of customers would have had to buy new eBook readers and download updated versions of the documents they already owned.

Adobe Digital Editions DRM logs user activity
Adobe have been spying on users without them knowing, gathering data on the DRM protected ebooks that have been opened and pages that have been read. Adobe also scans all the metadata from all of your ebooks on your hard disk and uploads that information to their servers.

Adobe release critical updates to plug PDF vulnerabilities
The updates address 8 vulnerabilities that could crash a computer system and allow an attacker to take control.

Malicious PDFs install malware on user’s computers
Adobe are to release an emergency PDF security patch to their Acrobat software after malicious PDFs have been circulating in the wild that install apps on the victim’s computer which steal passwords and system configuration data, and can log keystrokes.  Acrobat and Adobe Reader on both Windows and Mac are vulnerable. Evidently the Sandbox is not that effective after all…

Adobe limits PDF security vulnerabilities with improved Reader Sandbox
The latest Adobe Reader software comes with new internal security features and an improved sandbox that will make the products harder to attack and exploit, according to Adobe.  At last, a secure Adobe PDF Viewer?

Apple addresses PDF security issue with iOS update
The security update plugs a hole that could allow a hacker to utilize a maliciously crafted PDF file to gain access to a user’s system.  Visiting a site with this exploit could lead to unexpected application termination or arbitrary code execution.

13 new PDF security vulnerabilities fixed in Adobe Reader
The 13 new bugs included memory corruption vulnerabilities, buffer and heap overflow bugs, a cross-document scripting flaw, a DLL load hijacking vulnerability and a “security bypass” bug (a Reader X-only vulnerability that under certain circumstances lets an attacker force the Reader browser plug-in to download a non-PDF file).

PDF Security issues mainly down to JavaScript
A security researcher from FireEye Malware Protection said that many PDF security issues are generated through the support of inherently insecure script languages such as JavaScript and XML and the support of flash and video.  Most virus packages cannot detect malicious scripting and there are many places in a PDF document for hiding arbitrary data. Adobe recommend to disable JavaScript or use the sandbox introduced in Acrobat Reader X.

Adobe PDF Security Issues & PDF DRM Vulnerabilities – 2010

PDF Security issues to be sandboxed in Adobe X
Adobe Reader X introduces the sandbox feature which restrains code execution to a limited area in order to protect the Operating System from threats originating from PDF documents.  Adobe hope that this will tighten PDF Security and help prevent malicious code execution (JavaScript, embedded attachments, etc.) infecting a user’s computer.  Some experts say however that buffer overflow exploits and filesystem risks are not protected by the Adobe Reader X sandbox and so a truly secure Adobe PDF Reader is not yet available.

Adobe continue to be plagued by PDF Security issues
The latest PDF security issues affect Adobe Reader and could lead to a full scale denial of service attack or remote execution of malicious code on a user’s computer.

Secure PDF Viewer released by Google enhances PDF Security
Google have announced the beta release of their integrated PDF viewer to the Chrome Browser.  PDF files are automatically opened in a sandbox within the browser to stop PDF security issues such as malicious code from executing on the user’s computer.

Microsoft Toolkit fixes PDF security issues
Microsoft have release a toolkit that can be used to fix a security flaw in Acrobat and Acrobat Reader and prevent a hacker taking over a user’s computer when they open an ‘infected’ file. Malicious PDF files exploiting this flaw have been found circulating the Internet.  Adobe have yet to release their own patch for this PDF security issue despite issuing a security bulletin in which they announced that the flaw was indeed critical.

FileOpen Crack: FileOpen Publisher & WebPublisher crack updated
The Inept PDF Decrypter released back in June to decrypt FileOpen PDF files is being actively updated (FileOpen crack updates occurred in July, August & September).  The publisher claims that the FileOpen hack script will remove all DRM restrictions from any FileOpen protected pdf file produced by FileOpen Publisher, FileOpen WebPublisher, FileOpen RightsManager or FileOpen RightsServer.

Adobe release PDF security patch for latest Acrobat & Reader PDF security issues
Folowing releases from Foxit and Apple to fix PDF security issues in their own Readers/Browsers, Adobe has released their latest patch to prevent a potential hacker crashing and then gaining control of a user’s computer.  Adobe Acrobat Security Patch

PDF Security fix annouced by Apple fixes major PDF security issues
Apple has produced a security fix for the iPhone and iPad to create a more secure Adobe PDF environment.  The PDF security exploit could let hackers do critical damage to your iOS device if you simply open a malicious PDF file.  Apple are urging users to upgrade to the latest release which while fixing the PDF security issues, also stops the iPhone and iPad from being JailBroken…

Foxit Fix PDF Security issues to protect users from malicious PDFs
It took Foxit Software Corporation just 48 hours to provide a security fix to their 100 million user base which enabled hackers to use malicious PDFs to access sensitive data on users computers.  PDF security issues still continue to affect Acrobat however as Adobe have yet to provide a fix for their reader.

PDF Security issues in Adobe Reader leaves systems open to attack
The latest PDF security issue to hit Acrobat is due to the way in which the reader parses fonts.  This can be used by a hacker to produce a stack overflow error which then enables the intruder to remotely run malicious code on the affected computer.

PDF Security issues enable Apple’s iPhone and iPad to be hacked
A user visiting a malicious site using Safari can have their device hacked and/or infected with malicious files.  If you visit a web page with a PDF that contains a program that causes a stack overflow, then this gives a hacker deep access to your iPhone or iPad.  The exploit is possible on any iOS device running OS 3.1.2 or later.

PDF Security issues to be made top of Adobe’s agenda
Adobe are said to be looking at introducing a sand box in their next release of Acrobat Viewer to prevent malicious execution of code infecting user’s computers.

PDF Security issues continue as latest Adobe fix is compromized
The PDF security fix that Adobe provided for malicious code execution in Adobe Acrobat and Reader can be circumvented by attackers just by adding quote marks to their code.  Malicious code can therefore still be executed and trojans installed on user’s computers without their knowledge.

Adobe is the no. 1 target for malware attacks
Adobe is being targeted by attackers determined to spread malware on to users computers.  The exploits are PDF documents containing JavaScript that, without the user’s knowledge or consent, download and launch other pieces of malware direct from the Internet.

FileOpen crack – FileOpen PDF Security Handler cracked
The same company that cracked the Adobe Adept DRM for EPUB has reverse engineered the FileOpen PDF DRM system.  This crack affects FileOpen Publisher, FileOpen WebPublisher, FileOpen RightsManager and FileOpen RightsServer.

Flash security issue affects Adobe PDF security
Just like last year, hackers exploited the bug in authplay.dll using rigged PDF documents, and also used it in drive-by attacks that enticed users into viewing malicious Flash streaming media on attack sites.  Reader and Acrobat users can protect themselves by deleting or renaming authplay.dll.  Doing so, however, means that opening a PDF file containing Flash content will crash the software or produce an error message.

PDF security design issue enables deployment of Zeus Trojan
A PDF design issue is being exploited, enabling attackers to infect users with the Zeus Trojan.  According to Websense, attackers have been sending e-mails with a malicious PDF file.  The attack is similar to a technique security researcher Didier Stevens disclosed two weeks before that used the launch action function to launch an embedded executable in a PDF file.

PDF specification enables wormable attack
Jeremy Conway, an application security researcher at NitroSecurity, illustrated how a benign PDF file might become infected using features supported by the PDF specification. “I chose to infect the benign PDF with another, and launch a hack that redirected a user to my website, but this could have just as easily been an exploit pack and or embedded Trojan binary,” Conway explains. “Worse yet this dynamic infection vector could be utilized to populate all PDFs for some new O-day attack, thereby multiplying an attackers infection vehicles while still exploiting user systems (‘worm-able’).”  The attack was done without the use of external binaries or JavaScript.

PDF exploit requires no specific security hole to function
PDF security specialist Didier Stevens has developed a PDF document which is capable of infecting a PC – without exploiting a specific vulnerability. Stevens says he used the “Launch Actions/Launch File” option, which can start scripts and EXE files that are embedded in the PDF document.

Secure Adobe PDF Reader released by Nuance stops JavaScript
Nuance has released a Free Secure PDF Reader which addresses a troubling PDF security issue found within some readers by giving users the option to prevent JavaScript installation – something the Adobe PDF viewer does not do.  Preventing JavaScript installation creates a safer PDF environment for the end user and adds an additional safety net for IT professionals looking to safeguard their organizations.  Hackers have used the PDF JavaScript vulnerability to gain control of a user’s computer – exposing users to system attacks and the transfer of personal information simply by viewing infected PDF files.

Javascript yet again compromises PDF security
Yet again, the use of JavaScript in PDF documents has compromized the security of users computers.  A new JavaScript exploit that can be hidden in PDF files and exploit a widely documented PDF vulnerability is making the rounds.  Only 6 out of 40 anti-virus vendors can detect the malicious JavaScript.  This is just one of many security reasons to make sure JavaScript is disabled in Acrobat!

PDF Security Issues & PDF DRM Flaws and Cracks – 2009

Barnes and Noble EPUB DRM cracked
The Barnes & Noble Desktop Reader application (BDReader) uses a modified Adobe Adept scheme, and stores decryption keys in plain text in a SQLite database, thus proving to be an easy attack.

Internal disk path location exposed by lack of PDF security
The privacy issue arises from the fact that your local disk path gets invisibly embedded inside your PDF files in the title attribute.  When users print your PDF documents the local disk path is displayed. Users can also open your PDF documents in a text editor (i.e. notepad) to display your local disk path.

PDF DRM product exposes users computers to potential security risk
Users must enable JavaScript to view ProtectedPDF documents.  This exposes users to JavaScript-based vulnerabilities in Acrobat Reader, as well as possible loss of privacy.

Adobe security teams tells users to disable javascript in Adobe Acrobat Reader
The latest vulnerability employs a JavaScript error which can enable malicious code execution on Windows, Mac and Unix clients.  Whilst Adobe are recommending that users disable JavaScript in Adobe Reader until another patch is released, other security advisers are suggesting that JavaScript be removed from PDF Readers completely as a permanent solution.  The Sophos 2009 Security Threat Report, warned that hackers are increasingly looking at commonly used browser plugins like Adobe Flash and PDF in their attempts to infect innocent computer users.

Security company tells users to stop using Adobe Acrobat Reader
Of the targeted attacks so far this year, more than 47 percent of them exploit holes in Acrobat Reader while six vulnerabilities have been discovered that target the program, Mikko Hypponen, chief research officer of security firm F-Secure, said in a briefing with journalists.  Top-level executives, defense contractors, and other people who have access to specific sensitive corporate or government information are subject to targeted attacks where an attacker sends a file that has malicious code embedded in it.  Once the file is opened, the computer is infected typically with a back door that then steals data.

Protected PDF crack / hack: PDF security through obscurity
A hack to unlock protectedpdf files has been published that clearly shows the security offered by this PDF DRM software is simple to remove and is therefore no better than standard Adobe PDF password protection.

PDFs under attack yet again
A critical vulnerability identified in Adobe Reader 9 and Acrobat 9 as well as earlier versions will call the aforementioned applications to crash and could allow an attacker to take control of the affected systems. Adobe also acknowledged that there are reports the vulnerability issue is already being exploited.

PDF file can install malware without you even opening it!
Because of the way Windows file explorer works, infected PDF files can be executed without even clicking on them.  The exploited files use JavaScript heap spraying to facilitate arbitrary code execution.

Adobe Adept DRM for EPUB cracked
“There is very little obfuscation in how Adobe Digital Editions hides and encrypts the per-user RSA key, allowing fairly simple duplication of exactly the same process Digital Editions uses to retrieve it.”

Ziff Davis Enterprise serves Acrobat exploit through a malicious PDF file
Ziff Davis and other advertising companies were found to be serving PDF exploits through advertisements on their sites.  The malicious PDF served did not exploit the most recent PDF flaw that hit the news on February 20th but a much older one that uses JavaScript to install malware on the users computer.

PDF Security Issues & Acrobat Flaws & Cracks – 2008

Adobe 9 has 100 times weaker security than previous version
ElcomSoft, the company that discovered a security weakness in Adobe’s eBook software back in 2001, has found vulnerability in another Adobe Product.  While Adobe advertises Acrobat 9 as the most secure PDF production tool ever with enhanced 256-bit encryption, ElcomSoft has discovered that the new PDF protection system implemented in Acrobat 9 is even faster to recover than in previous versions. In fact, a hundred times faster.  “The new version of Adobe Acrobat is easier to break”, claims ElcomSoft CEO Vladimir Katalov, quoting a speed increase of two orders of magnitude for the new format. “The new product has surprisingly weak protection”, he adds.  According to ElcomSoft’s CEO, using 256-bit AES encryption per se is not enough to achieve ultimate security without employing complex approach and consideration of the entire security system.

Bugs in Adobe PDF exploited by hackers
Malicious hackers have targeted the PDF format yet again, exploiting the latest patches released from Adobe.  At least one of the hacks is not quarantined by anti-virus software and enables the attacker to take control of the affected system as per the non-patched versions in May of this year.

PDF exploits on the rise
Adobe has patched 17 security vulnerabilities in the Windows version of its Reader 8 software so far this year, in four separate patches.  New toolkits appearing on the market specifically target vulnerabilities in PDF files to gain access to user’s computers and Adobe’s use of allowing more sophisticated technology to run within PDF files is to blame.

Adobe PDF flaw could allow an attacker to take control of your system
Critical vulnerabilities have been identified in Adobe Reader and Acrobat 8 and 7.  These vulnerabilities would cause the application to crash and could allow an attacker to take control of the affected system.

Adobe PDF exploit infects ‘many thousands’, says researcher
The vulnerabilities were in Adobe Reader and Acrobat’s handling of JavaScript and in how it refers to libraries that provide encryption and signature verification.  “Exploitation of these vulnerabilities would allow an attacker to execute arbitrary code as the current user,” the iDefense advisory said.

PDF attacks more likely in the future
The recent Adobe patch has done little to ease the fear of security conscious users.  Exploit-laden PDF files will become more common in spear phishing attacks in the future since the Portable Document Format (PDF) is a de-facto standard for exchanging electronic documents online.  PDF files have traditionally been unfiltered at the gateway and until recently were considered risk free–in contrast to the notorious history associated with Microsoft Office documents.  With the release of Windows Vista and Microsoft Office 2007, however, Microsoft has made it more difficult for attackers to use buffer overflow exploits.  Therefore exploit writers are more likely to target the lower hanging fruit. Exploiting vulnerabilities in popular applications from Adobe, Apple, or RealPlayer are proving to be just as advantageous and profitable.

Acrobat PDF Security Issues, Flaws & Cracks – 2007

PDF Bug Compromises Windows PCs without users knowledge
A PDF vulnerability in Adobe’s Acrobat Reader has come to light that can lead to Windows PCs getting taken over completely without the users knowledge.  All it takes is to open a maliciously rigged PDF document or stumble across a page which embeds one.  Paul Henry, vice president of technology and evangelism at Secure Computing warned, the PDF threat is real.  “The ability to use PDFs to install malware and steal personal information from remote PCs is here,” he said in a statement.”  Readers should be cautioned to only open PDF files from senders they explicitly trust.”

Adobe 8 PDF password security broken
A single click of a button in pdf-Recover will remove the password, regardless of whether it has been encrypted using 40-bit RC4, 128-bit RC4 or even the latest 128-bit AES Adobe 8 Generation technology. The result is an exact replica of the original PDF without any security settings whatsoever – pdf-Recover removes all of the restrictions implemented.  The program is available for Windows 95 and later, MacOSX and Linux, and costs €19.

Latest critical Acrobat flaw puts user’s computers at risk
Another critical security vulnerability in Acrobat can let attackers crash vulnerable applications and execute arbitrary commands.

Deal plans revealed in Joost’s PDF documents
Another company falls foul of the PDF format not realizing that hidden text can be easily revealed by copying it into notepad.

Latest Acrobat Reader vulnerability puts user’s files at risk
Links with malicious JavaScript can access the user’s local machine and used to read files, delete them, execute programs, send the contents to the attacker, etc.  The security problem exists because the Web browser plug-in of the Adobe Systems’ Acrobat Reader allows JavaScript code appended to links to PDF files to run once the link is clicked.

PDF Security Issues and Ebook Security Flaws / Cracks – 2006

Adobe drop Acrobat Reader in DRM secure ebook product
For Adobe’s latest secure ebook product, Digital Editions, Acrobat Reader is not supported.  Instead, users will have to download a new viewer that enforces DRM controls.  Adobe state the 20MB+ file size of Acrobat Reader as one of the reasons they are not using it, but one suspects the fact that Acrobat Reader was not built with security in mind could be another.

Malicious code can be launched in at least 9 ways in PDF files
Whilst Acrobat is rich in features it is these very features that leave it open to attack.  A malicious user can manipulate legitimate features in Adobe PDF files to open back doors for computer attacks. Malicious links (once the document is opened, the target’s browser is automatically launched and loads the embedded link), attacks that use Adobe Systems’ ADBC (Adobe Database Connectivity) and Web Services support, use of HTML forms and file system access are just some of the ways Acrobat can be compromised by a malicious user.

ElcomSoft release PDF password cracker that breaks 128 bit encryption
The utility borrows all the idle processing bandwidth on a network to brute-force-attack a password-protected PDF.  ElcomSoft CEO Vladimir Katalov says that the tool wasn’t designed to enable mischief makers, but rather, to combat mischief itself.  From his security expert’s point of view, however, he opines that document-level password protection technically isn’t DRM (digital rights management).  And because of the plug-in architecture of Acrobat and PDF readers, it makes PDF a less-secure platform for DRM.

Full details of the product and pricing information can be found at ElcomSoft’s web site.

Acrobat flaw could result in remote code execution
Adobe released a patch on 11th July for a flaw that could allow a malicious PDF document to trigger buffer overflow.  The overflow could cause Adobe Acrobat to crash and result in remote code execution if malicious content is inserted into a PDF file, according to the Adobe advisory. The flaw is considered critical by the company.

Acrobat secure PDF files compromised with ‘view as HTML’ function
Acrobat secure PDF files that are received in Gmail can be viewed as HTML if the ‘View as HTML’ link is selected.  The full document is displayed as HTML even if the original PDF is secured against content copying or extraction.  Respecting security permissions on a PDF file is therefore something that must be done on a “honor” basis by the application!

Adobe PDF Ebook Security Issues & Cracks – 2002-2005

Adobe Acrobat user gaffe exposes classified Defense information
A military report on an investigation into the shooting death of an Italian security agent includes blocks of classified data that can be deciphered as easily as copying and pasting text. Multinational Forces-Iraq issued the report in Adobe Portable Document Format on April 30 as an unclassified document, with blocks of classified redacted information obscured from public view. But copying and pasting the classified sections into Microsoft Notepad reveals the blocked text. The breach was discovered by an Italian blogger shortly after the report was posted.

Wiley’s ebooks cracked despite using “secure” PDF DRM
Wiley Publishers acknowledge that the protection used in FileOpen PDF DRM is not up to much – the pirated ebooks are available before the print books are distributed to all the bookstores who have ordered them.

$20 Million Copyright Award A Boost To Publishers
Specialized-information publishers won another weapon in their fight to protect their products from copyright violations last week when a federal court jury in Baltimore awarded NEPA member Paul Desmond a nearly $20 million judgment against financial-services firm Legg Mason Inc. for violating his company’s copyright.  Desmond, president of Lowry’s Reports, Inc., of North Palm Beach, FL, sued Baltimore-based Legg Mason after receiving reports that the company had been systematically circulating and putting on its intranet electronic copies (PDF) of Lowry’s Market Trend Analysis, a daily e-mail stock market commentary, for more than a decade.

Flaw in FileOpen Publisher allows ‘secure’ PDF documents to be opened without a key
A serious flaw in FileOpen Publisher allows users to open “protected PDF documents” without entering an authorization code.

Adobe Plug-ins compromised
There are many Adobe Acrobat and Adobe Reader plug-ins that can load (by design) only in certified mode.  One example is all documents protected with “Adobe DRM” security handler (so-called eBooks).  Certified mode assures that all other plug-ins, loaded with those ones, have been also certified by Adobe.  However, with this vulnerability, the plug-in with forged signature can perform virtually everything, including but not limited to:

  • removing or modifying any restrictions (from copying text to Clipboard, printing etc) from the documents loaded into Adobe Acrobat or Adobe Reader
  • remove any DRM (Digital Rights Management) schemes from PDF documents, regardless the encryption handler used – WebBuy, InterTrust DocBox, Adobe DRM (EBX) etc.
  • modify or remove digital signatures used within a PDF document
  • affect any/all other aspects of a document’s confidentiality, integrity and authenticity.

The official US-CERT posting can be viewed here along with Adobe’s response

FileOpen is just ‘snake oil’
FileOpen protection (including one implemented in expensive and “very secure” WebPublisher can be removed either instantly or in a matter of a few hours – without Adobe Reader, FileOpen plug-in itself or whatever.  I’d call it “snake-oil” (see Bruce Schneier’s definition of the term) because of multiple vulnerabilities. Their main protection is DMCA – Digital Millennium Copyright Act.)” – Vladimir Katalov, Managing Director, ElcomSoft Co.Ltd.

Adobe Acrobat and PDF security: no improvements for 2 years. Software released in 2003 contains vulnerabilities disclosed in 2001
In early 2001, Elcomsoft discovered a serious security flaw in Adobe Acrobat and Adobe Acrobat Reader.  In July 2001, they briefly described it in “eBook Security: Theory and Practice” speech on DefCon security conference.  Since there was no reaction from Adobe (though Adobe representative has attended the conference), they reported this vulnerability to CERT in September 2002 (after more than a year), still not disclosing technical details to the public. Only in March 2003, CERT Vulnerability Note (VU#549913) was published, and after a week, Adobe has responded officially (for the first time) issuing the Vendor Statement (JSHA-5EZQGZ), promising to fix the problem in new versions of Adobe Acrobat and Adobe Reader software expected in the second quarter of 2003. When these versions became available, whilst some minor improvements have been made, the whole Adobe security model was still very vulnerable, and so Elcomsoft sent a follow-up to both CERT and Adobe.  Both parties failed to respond.

ElcomSoft acquitted
In a blow to a controversial copyright law, a federal jury in San Jose on Tuesday acquitted a Russian firm of charges that it sold software designed to crack security on Adobe Systems’ electronic book technology.
Russian firm points out new Adobe flaw
Thumbing its nose at the company that landed one of its employees in jail, ElcomSoft is pointing out new flaws in Adobe Systems’ eBook software.  The flaws could allow someone to check out every copy of every book in Adobe’s new electronic library for an unlimited amount of time by changing the values in the loan form.

PDF Security, FileOpen and Ebook Security Flaws & Cracks – 2001

FileOpen Publisher and E-Book Security Pro weaknesses exposed
Ebook Pro – “The $197 e-book protection software is advertised as 100% burglarproof and claims a list of Fortune 500 companies as its customers.  Sklyarov found that the software “encrypts” e-books by mixing each byte of the text with a constant byte.  This is a technique so weak that it probably shouldn’t even be called cryptography.”

FileOpen Publisher – “The code can be broken instantly.  FileOpen software, puts key information in the encrypted document, which is sort of like leaving your car with the keys in the ignition.  FileOpen was chosen as an Adobe “security partner”, which leads me to wonder how closely Adobe examines the cryptography used by its partners.”

Adobe PDF Security and FileOpen cracked
Feds arrest Russian cracker for breaking Adobe’s PDF security controls.  Last year ElcomSoft produced a piece of software that cracked FileOpen’s code — potentially driving it out of business. Adobe FAQ: ElcomSoft legal background.

FileOpen Systems responds to ElcomSoft PDF decryption
FileOpen Systems condemns the actions of ElcomSoft in releasing software to remove encryption from PDF files.

ElcomSoft vs Adobe: How AEBPR cracked Adobe Acrobat’s E-Book Reader
Adobe Acrobat Security module – the weaknesses of plugins and how AEBPR easily cracked the encryption process.

ElcomSoft’s Adobe PDF decryption banned in the US but not in Europe
“In Germany and Scandinavia, our software is absolutely legal.  We have requests from different companies who are ready to translate this program to German and distribute it in Germany without any limitations.”

eBook security is an absolute joke and is even weaker than the standard PDF security
It appears that the security placed on Adobe Acrobat eBook Reader files is not stronger but feebler than that for PDF files.



Cracks, vulnerabilities, issues and flaws reported on Adobe PDF Security, Adobe DRM, FileOpen, FileOpen Publisher, FileOpen WebPublisher, PDF plugins, and poor PDF security and secure ebook implementations. Adobe vulnerabilities, PDF password crackers and malicious PDF JavaScript.

Customer Testimonials