Adobe PDF Security Issues & PDF DRM Vulnerabilities – 2010
PDF Security issues to be sandboxed in Adobe X
Adobe Reader X introduces the sandbox feature which restrains code execution to a limited area in order to protect the Operating System from threats originating from PDF documents. Adobe hope that this will tighten PDF Security and help prevent malicious code execution (JavaScript, embedded attachments, etc.) infecting a user’s computer. Some experts say however that buffer overflow exploits and filesystem risks are not protected by the Adobe Reader X sandbox and so a truly secure Adobe PDF Reader is not yet available.
Adobe continue to be plagued by PDF Security issues
The latest PDF security issues affect Adobe Reader and could lead to a full scale denial of service attack or remote execution of malicious code on a user’s computer.
Secure PDF Viewer released by Google enhances PDF Security
Google have announced the beta release of their integrated PDF viewer to the Chrome Browser. PDF files are automatically opened in a sandbox within the browser to stop PDF security issues such as malicious code from executing on the user’s computer.
Microsoft Toolkit fixes PDF security issues
Microsoft have release a toolkit that can be used to fix a security flaw in Acrobat and Acrobat Reader and prevent a hacker taking over a user’s computer when they open an ‘infected’ file. Malicious PDF files exploiting this flaw have been found circulating the Internet. Adobe have yet to release their own patch for this PDF security issue despite issuing a security bulletin in which they announced that the flaw was indeed critical.
FileOpen Crack: FileOpen Publisher & WebPublisher crack updated
The Inept PDF Decrypter released back in June to decrypt FileOpen PDF files is being actively updated (FileOpen crack updates occurred in July, August & September). The publisher claims that the FileOpen hack script will remove all DRM restrictions from any FileOpen protected pdf file produced by FileOpen Publisher, FileOpen WebPublisher, FileOpen RightsManager or FileOpen RightsServer.
Adobe release PDF security patch for latest Acrobat & Reader PDF security issues
Folowing releases from Foxit and Apple to fix PDF security issues in their own Readers/Browsers, Adobe has released their latest patch to prevent a potential hacker crashing and then gaining control of a user’s computer. Adobe Acrobat Security Patch
PDF Security fix annouced by Apple fixes major PDF security issues
Apple has produced a security fix for the iPhone and iPad to create a more secure Adobe PDF environment. The PDF security exploit could let hackers do critical damage to your iOS device if you simply open a malicious PDF file. Apple are urging users to upgrade to the latest release which while fixing the PDF security issues, also stops the iPhone and iPad from being JailBroken…
Foxit Fix PDF Security issues to protect users from malicious PDFs
It took Foxit Software Corporation just 48 hours to provide a security fix to their 100 million user base which enabled hackers to use malicious PDFs to access sensitive data on users computers. PDF security issues still continue to affect Acrobat however as Adobe have yet to provide a fix for their reader.
PDF Security issues in Adobe Reader leaves systems open to attack
The latest PDF security issue to hit Acrobat is due to the way in which the reader parses fonts. This can be used by a hacker to produce a stack overflow error which then enables the intruder to remotely run malicious code on the affected computer.
PDF Security issues enable Apple’s iPhone and iPad to be hacked
A user visiting a malicious site using Safari can have their device hacked and/or infected with malicious files. If you visit a web page with a PDF that contains a program that causes a stack overflow, then this gives a hacker deep access to your iPhone or iPad. The exploit is possible on any iOS device running OS 3.1.2 or later.
PDF Security issues to be made top of Adobe’s agenda
Adobe are said to be looking at introducing a sand box in their next release of Acrobat Viewer to prevent malicious execution of code infecting user’s computers.
PDF Security issues continue as latest Adobe fix is compromized
The PDF security fix that Adobe provided for malicious code execution in Adobe Acrobat and Reader can be circumvented by attackers just by adding quote marks to their code. Malicious code can therefore still be executed and trojans installed on user’s computers without their knowledge.
Adobe is the no. 1 target for malware attacks
Adobe is being targeted by attackers determined to spread malware on to users computers. The exploits are PDF documents containing JavaScript that, without the user’s knowledge or consent, download and launch other pieces of malware direct from the Internet.
FileOpen crack – FileOpen PDF Security Handler cracked
The same company that cracked the Adobe Adept DRM for EPUB has reverse engineered the FileOpen PDF DRM system. This crack affects FileOpen Publisher, FileOpen WebPublisher, FileOpen RightsManager and FileOpen RightsServer.
Flash security issue affects Adobe PDF security
Just like last year, hackers exploited the bug in authplay.dll using rigged PDF documents, and also used it in drive-by attacks that enticed users into viewing malicious Flash streaming media on attack sites. Reader and Acrobat users can protect themselves by deleting or renaming authplay.dll. Doing so, however, means that opening a PDF file containing Flash content will crash the software or produce an error message.
PDF security design issue enables deployment of Zeus Trojan
A PDF design issue is being exploited, enabling attackers to infect users with the Zeus Trojan. According to Websense, attackers have been sending e-mails with a malicious PDF file. The attack is similar to a technique security researcher Didier Stevens disclosed two weeks before that used the launch action function to launch an embedded executable in a PDF file.
PDF specification enables wormable attack
Jeremy Conway, an application security researcher at NitroSecurity, illustrated how a benign PDF file might become infected using features supported by the PDF specification. “I chose to infect the benign PDF with another, and launch a hack that redirected a user to my website, but this could have just as easily been an exploit pack and or embedded Trojan binary,” Conway explains. “Worse yet this dynamic infection vector could be utilized to populate all PDFs for some new O-day attack, thereby multiplying an attackers infection vehicles while still exploiting user systems (‘worm-able’).” The attack was done without the use of external binaries or JavaScript.
PDF exploit requires no specific security hole to function
PDF security specialist Didier Stevens has developed a PDF document which is capable of infecting a PC – without exploiting a specific vulnerability. Stevens says he used the “Launch Actions/Launch File” option, which can start scripts and EXE files that are embedded in the PDF document.
Secure Adobe PDF Reader released by Nuance stops JavaScript
Nuance has released a Free Secure PDF Reader which addresses a troubling PDF security issue found within some readers by giving users the option to prevent JavaScript installation – something the Adobe PDF viewer does not do. Preventing JavaScript installation creates a safer PDF environment for the end user and adds an additional safety net for IT professionals looking to safeguard their organizations. Hackers have used the PDF JavaScript vulnerability to gain control of a user’s computer – exposing users to system attacks and the transfer of personal information simply by viewing infected PDF files.
Javascript yet again compromises PDF security
Yet again, the use of JavaScript in PDF documents has compromized the security of users computers. A new JavaScript exploit that can be hidden in PDF files and exploit a widely documented PDF vulnerability is making the rounds. Only 6 out of 40 anti-virus vendors can detect the malicious JavaScript. This is just one of many security reasons to make sure JavaScript is disabled in Acrobat!