PCMag.com PCMag.com Blogs Security Watch PCMag Digital Network
  SEARCH 
Security Watch  
PCMAG.COM 
Subscribe to
Security Watch

Our FREE email newsletter delivered to your inbox.
Email: 
Format: 
 
Security Watch on Twitter
Categories:  

reader_icon_special.jpgPDF researcher Didier Stevens has been working lately on ways to execute arbitrary code out of PDF files and has come up with a new and surprising one: He can run an executable embedded inside a PDF without exploiting a vulnerability. Stevens isn't revealing the details of the technique yet.



pdfdialig.jpg

Different PDF readers react differently to the technique. Adobe reader displays the warning dialog above. Stevens can make the attack more likely to succeed by changing the contents of the box: Instead of the file name it could say "Please click Open" or some other social engineering message.

But Foxit Reader, which many users have switched to, supposedly for security reasons, doesn't even display a warning dialog. It just automatically executes the embedded EXE. A commenter to Stevens's post gives a story of a related vulnerability, and Stevens says it's not uncommon for Foxit to blindly execute dangerous activities in cases where Adobe's software warns the user.

I also tested Nuance's free PDF reader. It said opens a dialog box that says cannot open file "cmd.exe".

Update: Stevens tells me that he was able to get the attack working in Nuance by hard-coding the location of cmd.exe.

If there really is no vulnerability involved then we'll have to wait and see what approach Adobe and other vendors take to this issue. Adobe could just choose to identify it more precisely and give a stronger warning dialog box. Foxit could choose to do something, anything.

Twitter Digg It Share on Facebook Stumble It Slashdot Add to Mixx! submit to reddit Linked In Add to Technorati Favorites Share More...
* = required
    Remember Me?
  
Please keep your comments on topic. Intelligent, thoughtful comments and questions are appreciated. Comments that contain personal attacks or profanity may be edited or removed. Comments containing personal information such as phone numbers, credit card numbers, or addresses may be edited or removed. Comments with advertisements will be removed.


         
 
  Ziff Davis Home | Contact Us | Advertise | Link to Us | Newsletters | RSS Feeds | Ziff Davis Media International
Digital Edition Customer Service | Subscribe to PCMag Digital Edition | Reprints
AppScout | Cranky Geeks | DigitalLife | DL.TV | ExtremeTech | GearLog | GoodCleanTech | PC Magazine | PCMagCasts | Security Watch | Smart Device Central | TechSaver
AppScout Mobile | Gearlog Mobile | GoodCleanTech Mobile | PCMag.com Mobile
Privacy Policy | Terms of Service | Linking Policy | Contact Us
Copyright © 1996-2009 Ziff Davis Publishing Holdings Inc. All Rights Reserved. PC Magazine, the PCMag.com logo and Gearlog are registered trademarks of Ziff Davis Publishing Holdings Inc. Reproduction in whole or in part in any form or medium without express written permission of Ziff Davis Media Inc. is prohibited.