|
BugTraq
0day: PDF pwns Windows Sep 20 2007 01:21PM pdp (architect) (pdp gnucitizen googlemail com) (3 replies) Re: [Full-disclosure] 0day: PDF pwns Windows Sep 21 2007 07:53PM Thierry Zoller (Thierry Zoller lu) (2 replies) Re: [Full-disclosure] 0day: PDF pwns Windows Sep 21 2007 09:21PM Aaron Collins (collinsa ehawaii gov) Re: [Full-disclosure] 0day: PDF pwns Windows Sep 21 2007 09:21PM Kevin Finisterre (lists) (kf_lists digitalmunition com) Re: 0day: PDF pwns Windows Sep 20 2007 03:29PM Gadi Evron (ge linuxbox org) (1 replies) Re: 0day: PDF pwns Windows Sep 20 2007 11:16PM Crispin Cowan (crispin novell com) (2 replies) Re: 0day: PDF pwns Windows Sep 23 2007 05:34AM Crispin Cowan (crispin novell com) (2 replies) Re: 0day: PDF pwns Windows Sep 23 2007 11:52PM Chad Perrin (perrin apotheon com) (2 replies) Re: 0day: PDF pwns Windows Sep 24 2007 10:57PM Lamont Granquist (lamont scriptkiddie org) (1 replies) Re: 0day: PDF pwns Windows Sep 25 2007 05:57PM Roland Kuhn (rkuhn e18 physik tu-muenchen de) (1 replies) RE: 0day: PDF pwns Windows Sep 25 2007 06:39PM Thor (Hammer of God) (thor hammerofgod com) (2 replies) defining 0day Sep 25 2007 07:02PM Gadi Evron (ge linuxbox org) (3 replies) Re: defining 0day Sep 25 2007 08:40PM Charles Miller (cmiller pastiche org) (2 replies) Re: defining 0day Sep 26 2007 11:25PM Zow Terry Brugger (zow llnl gov) (1 replies) Re: defining 0day Sep 26 2007 11:10PM Chad Perrin (perrin apotheon com) (1 replies) Re: defining 0day Sep 25 2007 07:51PM Brian Loe (knobdy gmail com) (1 replies) Re: defining 0day Sep 25 2007 07:59PM Gadi Evron (ge linuxbox org) (1 replies) Re: defining 0day Sep 25 2007 08:15PM Brian Loe (knobdy gmail com) (1 replies) |
|
Privacy Statement |
> http://www.gnucitizen.org/blog/0day-pdf-pwns-windows
>
> I am closing the season with the following HIGH Risk vulnerability:
> Adobe Acrobat/Reader PDF documents can be used to compromise your
> Windows box. Completely!!! Invisibly and unwillingly!!! All it takes
> is to open a PDF document or stumble across a page which embeds one.
>
> The issue is quite critical given the fact that PDF documents are in
> the core of today's modern business. This and the fact that it may
> take a while for Adobe to fix their closed source product, are the
> reasons why I am not going to publish any POCs. You have to take my
> word for it. The POCs will be released when an update is available.
>
> Adobe's representatives can contact me from the usual place. My advise
> for you is not to open any PDF files (locally or remotely). Other PDF
> viewers might be vulnerable too. The issues was verified on Windows XP
> SP2 with the latest Adobe Reader 8.1, although previous versions and
> other setups are also affected.
>
> A formal summary and conclusion of the GNUCITIZEN bug hunt to be expected soon.
>
> cheers
>
>
Hi
Your point is right. But there are a number of factors other
than this
in exploiting pdf in other sense. My latest research is working over the
exploitation of PDF.
Even if you look at the core then there are no restriction on READ in PDF
in most of the versions. Only outbound data is filtered to some extent. you
can even read /etc/passwd file from inside of PDF.
Other infection vector includes infection through Local Area Networks
through
sharing and printing PDF docs and all.
My upcoming research feature everything regarding this and the issue you
have
already discussed.
Regards
Aks
http://ww.secniche.org
[ reply ]