The new adobe vulnerability is now exploitable not only by reading the infected pdf file but also by at least three different methods using metadata which is used by windows to show file information. It turns out that adobe has a shell extension which get the file information. Security Researcher "Didier Stevens" have released a short video on his blog which shows how this vulnerability can be easily exploited in windows. The dangers associated with this vulnerability have leveraged the threat level using the JBIG2Decode exploit. Meanwhile a new exploit have also been released today which shows foxit pdf viewer (the alternative to adobe viewer) as the victim. The only tip that I can give you guys now is to only open files or should I say receive files from trusted sources.
The video and the original blog post can be found on the following links.
http://www.youtube.com/v/2poufBYBBoo&rel=1&fs=1&showsearch=0
http://blog.didierstevens.com/2009/03/04/quickpost-jbig2decode-trigger-trio/
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment