Adobe is on the defensive following the discovery of a security loophole previously believed to have been patched by the company.
The flaw, which exists in the Reader and Acrobat components, could allow an attacker to remotely execute a malicious application through code embedded in a PDF file by manipulating a warning dialogue.
Adobe had earlier issued a patch to address the vulnerability by instituting a blacklist which could block executable files from being launched. Researchers are reporting, however, that the protections can be circumvented.
Bkis security researcher Le Manh Tung has reported that by simply adding quotation marks will allow for Adobe's protections to be circumvented and for an attacker to once again post a misleading warning dialogue.
"With the quotes added, Adobe Reader will not block the execution," wrote Tung in a blog post.
"Adobe Reader version 9.3.3 has fixed the fake warning massage, but the threat of exploit code execution still remains."
Adobe has acknowledged the report and has issued a blog posting of its own on the matter. Director of product security and privacy Brad Arkin said that the company was keeping the launch component active, but would also look at updating the blacklist to protect against future attacks.
"While blacklist capabilities alone are not a perfect solution to defend against those with malicious intent, this option reduces the risk of attack, while minimising the impact on customers relying on workflows that depend on the launch functionality," Arkin wrote.
PDF vulnerability lingers despite patch
By
Shaun Nichols
on Jul 5, 2010 8:29AM
Got a news tip for our journalists? Share it with us anonymously here.
Partner Content
Empowering Sustainability: Schneider Electric's Dedication to Powering Customer Success
New Microsoft CSP rules? Here’s how MSPs can stay ahead with Ingram Micro
MSPs with a robust data protection strategy will achieve market success
How mandatory climate reporting is raising the bar for corporate leadership
Beyond the box: How Crayon Is Redefining Distribution for the Next Era
Sponsored Whitepapers
Cut through the SASE confusion
Stay protected as cyber threats evolve
Defend Your Network from the Next Generation of AI Threats
The race to AI advantage is on. Don’t let slow consulting projects hold you back.
The changing face of Australian distribution




