diff options
Diffstat (limited to 'old/published/Webmonkey/Monkey_Bites/2007/01.01.05/Thu/pdf flaws.txt')
-rw-r--r-- | old/published/Webmonkey/Monkey_Bites/2007/01.01.05/Thu/pdf flaws.txt | 1 |
1 files changed, 0 insertions, 1 deletions
diff --git a/old/published/Webmonkey/Monkey_Bites/2007/01.01.05/Thu/pdf flaws.txt b/old/published/Webmonkey/Monkey_Bites/2007/01.01.05/Thu/pdf flaws.txt deleted file mode 100644 index d60a945..0000000 --- a/old/published/Webmonkey/Monkey_Bites/2007/01.01.05/Thu/pdf flaws.txt +++ /dev/null @@ -1 +0,0 @@ -A new and rather serious flaw has been [found in Adobe's Acrobat Reader plug-in][1]. The vulnerability exists in nearly any browser with the Acrobat Reader plug-in installed and allows malicious Javascript code to be injected on the client side.
Possible attacks that could be delivered using the flaw include session riding, cross-site scripting attacks and, in the case of Internet Explorer, denial of service attacks.
The attack works via html links that pass additional parameters to the Acrobat Reader plug-in. Because the plug-in does not properly sanitize incoming urls, it's possible to use a link to execute arbitrary code:
http://site.com/file.pdf#FDF=javascript:alert('Test Alert')
In this case the plug-in would execute the Javascript that the end of the url, but other attacks are also possible and vary somewhat by browser.
As Hon Lau [writes][2] on the Symantec security response blog, "the ease in which this weakness can be exploited is breathtaking."
Lau goes on to add, "what this means in a nutshell is that anybody hosting a .pdf, including well-trusted brands and names on the Web, could have their trust abused and become unwilling partners in crime."
Symantec initially reported that the flaw only affected Firefox users, but has since amended that to include Internet Explorer 6. Stefano Di Paola, who originally discovered the flaw, also mentions Opera, but does give any specific Opera examples.
The flaw exists in Adobe Acrobat 7 and below. Adobe recommends upgrading to the new Acrobat 8 (see Monkey Bites [review][3]), but for those that don't want to upgrade, the post on Symantec's security response blog has details on a workaround that disables the Acrobat Reader plugin.
[1]: http://www.wisec.it/vulns.php?page=9 "Adobe Acrobat Reader Plugin - Multiple Vulnerabilities"
[2]: http://www.symantec.com/enterprise/security_response/weblog/2007/01/when_pdfs_attack.html "When PDFs attack"
[3]: http://blog.wired.com/monkeybites/2006/12/adobe_acrobat_8.html "Monkey Bites on Acrobat Reader 8"
\ No newline at end of file |