Researcher Uncovers PDF Executable Vulnerability

Another security headache for Adobe has emerged after a security researcher found a new way to exploit Adobe Reader and other PDF-viewing software.

The researcher, Didier Stevens, has developed a proof-of-concept PDF file that launches an embedded executable. According to Stevens, PDF viewers like Adobe Reader and Foxit Software’s Foxit Reader do not allow embedded executables to be extracted and run. In his proof-of-concept, however, he was able to execute the embedded executable using a launch action triggered when his PDF file is opened.

Despite his findings, Adobe Systems told eWEEK the protections that exist are enough to defend users.

“The warning message provided in Adobe Reader and Adobe Acrobat includes strong wording advising users to only open and execute the file if it comes from a trusted source,” noted Adobe spokesperson Wiebke Lips.

According to Stevens, the idea of using the launch action functionality first came to his attention about two years ago. Though he did some tests at the time, he noted that a warning was generated when he tried to launch a program, so he did not investigate further.

“A couple of weeks ago, I revisited my research, and noticed that the dialogue box had changed, and I found a way to partially control the message displayed by the warning dialogue,” said Stevens, an IT security consultant for Contraste Europe. “This motivated me to continue to look for a way to abuse the possibility to pass parameters to cmd.exe, and ultimately execute arbitrary code that I embed in the PDF document.”

He added that he could have chosen to download arbitrary code and execute it as well. In addition, he found that Foxit Reader generates no warning at all, and the action gets executed without user interaction.

Lips said Stevens’ proof-of-concept relies on functionality defined in the PDF specification (ISO PDF 32000-1:2008) and is an example of “powerful functionality relied on by some users that also carries potential risks when used incorrectly.”

Adobe takes the security of our products and technologies very seriously; we are therefore always listening to and evaluating ways to allow end users and administrators to better manage and configure features like this one to mitigate potential associated risks,” Lips said.

On his blog, Stevens wrote that disabling JavaScript will have no effect on this, and patching Adobe Reader is technically not possible since he is “just being creative with the PDF language specs.”

Ideally, he told eWEEK, Adobe should just disable the feature.

“A quick fix is to remove the code that recognizes the launch keyword,” he added. “But I have no idea how prevalent the use of this launch action is in the world of benign PDF documents.”

Brian Prince eWEEK USA 2014. Ziff Davis Enterprise Inc. All Rights Reserved

Share
Published by
Brian Prince eWEEK USA 2014. Ziff Davis Enterprise Inc. All Rights Reserved
Tags: AdobePDF

Recent Posts

SoftBank Promises To Invest $100bn In US

Japanese tech investment firm SoftBank promises to invest $100bn during Trump's second term to create…

9 hours ago

Synopsys, SiMa.ai To Collaborate On AI Car Chips

Synopsys to work with start-up SiMa.ai on joint offering to help accelerate development of AI…

9 hours ago

AI Start-Up Basis Raises $34m For Accountancy Agent

Start-up Basis raises $34m in Series A funding round for AI-powered accountancy agent to make…

10 hours ago

Databricks Raises $10bn In Huge AI Funding Round

Data analytics and AI start-up Databricks completes huge $10bn round from major venture capitalists as…

10 hours ago

Congo Files Complaints Against Apple Over Conflict Minerals

Congo files legal complaints against Apple in France, Belgium alleging company 'complicit' in laundering conflict…

11 hours ago