January 4, 2007 7:25 PM PST

PDF security risk greater than originally thought

Related Stories

Acrobat flaw could spawn Web attacks

January 3, 2007

FAQ: JavaScript insecurities

July 28, 2006

The security risk in Web 2.0

July 28, 2006
A recently discovered security weakness in the widely used Acrobat Reader software could put Net users at more risk than previously thought, experts warned Thursday.

Initially, security professionals thought that the problem was restricted and exposed only Web-related data or could support phishing scams. Now it has been discovered that miscreants could exploit the problem to access all information on a victim's hard disk drive, said Web security specialists at WhiteHat Security and SPI Dynamics.

Key to increased access is where hostile links point. When the issue was first discovered, experts warned of links with malicious JavaScript to PDF files hosted on Web sites. While risky, this actually limits the attacker's access to a PC. It has now been discovered that those limits can be removed by directing a malicious link to a PDF file on a victim's PC.

"This means any JavaScript can access the user's local machine," Billy Hoffman, lead engineer at SPI Dynamics, said in an e-mailed statement. "Depending on the browser, this means the JavaScript can read the user's files, delete them, execute programs, send the contents to the attacker, et cetera. This is much worse than an attack in the remote zone."

By contrast, a link to a PDF hosted on a Web site with malicious JavaScript code would run on the user's machine with limited access, or the "remote zone," Hoffman said. For example, script code in a link to a PDF on "bank.com" would be able to communicate with bank.com and access its cookies, he said. Such a standard cross-site-scripting attack could allow account hijacks, for example.

The security problem exists because the Web browser plug-in of the Adobe Systems' Acrobat Reader allows JavaScript code appended to links to PDF files to run once the link is clicked, said Jeremiah Grossman, chief technology officer at WhiteHat Security.

For an attack to work, a malicious link has to point to an existing PDF file on the Web or on the target system. PDFs are abundant on the Net and finding one on a local system also isn't hard, a sample PDF file comes with Acrobat Reader and is installed in a predictable location on PCs, Grossman said.

The security problem was first disclosed at the Chaos Computer Club conference in Germany over the holidays in a paper by Stafano Di Paola and Giorgio Fedon. The extended scope of the issue was publicized late Wednesday by a hacker using the moniker "RSnake."

Adobe is aware of the claims that an attack could have broader implications, but had not verified the issue, a company representative said in a statement e-mailed Thursday.

"Based upon info we have, Flash Player, Reader and modern browsers should restrict such an exploit, but we haven't completed our evaluation of all possible scenarios," the representative said.

To mitigate the threat, Adobe says people can upgrade to Adobe Reader 8, the latest version of the Adobe software released last month. Adobe is also working on updates to previous versions that will resolve this issue, the company has said.

See more CNET content tagged:
SPI Dynamics, Adobe Acrobat Reader, Adobe Systems Inc., victim, JavaScript

 

Join the conversation

Add your comment

The posting of advertisements, profanity, or personal attacks is prohibited. Click here to review our Terms of Use.

What's Hot

Discussions

Shared

RSS Feeds

Add headlines from CNET News to your homepage or feedreader.