Merely storing, without opening, a malicious PDF file can trigger an attack that exploits the new, unpatched zero-day flaw in Adobe Reader, a researcher has discovered. Didier Stevens, a researcher and IT security consultant with Contrast Europe NV, today released a proof-of-concept demonstration that shows how a file infected with the Adobe flaw can trigger a new attack when the machine uses Windows Indexing Services. And the user doesn’t even have to open or select the document.
In addition, Stevens last week released a proof-of-concept demonstrating how PDF files could be exploited with minimal user interaction — just saving it to the hard drive and viewing it in Windows Explorer.
But this latest attack vector is more risky, he says, because the user doesn’t have to do anything with the file at all. “It requires no user interaction, and for the Windows Indexing Service, it can lead to total system compromise [with] privilege escalation,” Stevens says.
Windows Indexing Service is an operating system-level feature that provides an index of files on the system.
Adobe plans to release updates to address the vulnerability starting this week: By March 11, it will update Adobe Reader 9 and Acrobat 9, and by March 18, Adobe Reader 7 and 8 and Acrobat 7 and 8.
Stevens’ latest attack demonstrates how an infected PDF sitting on a Windows XP SP2 machine — with Windows Indexing Services and Adobe Acrobat Reader 9 running — gets “indexed.” Then the malware is executed, allowing for a privilege escalation attack. Stevens recommends disabling the indexing services’ ability to index PDFs.
Why the seemingly increase in threats to documents like PDFs? It’s all about the bad guys looking for new ways to get malware past filters. “Sending executables via e-mail is not as effective as it used to be. Many enterprises, free e-mail providers, and AV products block attached executables. So malware authors are looking for other vectors and are starting to use document formats, like MS Office formats and PDF,” Stevens says. “Document attachments are rarely blocked.”
Meanwhile, Stevens says since this was just another method of exploiting the Adobe zero-day bug, he didn’t report it to Adobe first. “If this would have been a new bug in Acrobat, I would have disclosed this to Adobe and not made it public before a patch was available. But since this is another way to exploit the zero-day that was reported to Adobe in February, I made it public so users and administrators can take appropriate actions,” he says.
Related Posts: On this day...
- Mariana Davalos: Maxim March 2011 - 2011
- Anonymous to release BofA dox - 2011
- TRON: The Next Day - Flynn Lives Revealed - 2011
- Iraqi Tron - 2011
- Teacher Writes "Loser" on Student's Paper - 2010
- Netflix Cancels $1 Million Contest, Settles Privacy Lawsuit - 2010
- HOWTO: Create a bootable self-playing video disc - 2009
- Hosted malware allows n00bs to hack along with the l33t - 2009
- Twitter Business Model Found - 2009
- Stop REAL ID in Pennsylvania Today! - 2008