lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <8e5ffb560609161622v17c2ce42gadd2a3a8ab578492@mail.gmail.com>
Date: Sun, 17 Sep 2006 05:07:02 +0545
From: "Bipin Gautam" <gautam.bipin@...il.com>
To: "David Kierznowski" <david.kierznowski@...il.com>
Cc: full-disclosure@...ts.grok.org.uk, security-basics@...urityfocus.com
Subject: Re: Backdooring PDF Files

Looks to me like its a flaw in the PLUG-IN not the Acrobat Reader
itself. Here plugin should be disabled for the "URI" action.

Go to your folder   .....ProgramFileDir\Adobe\Acrobat ver\Reader\plug_ins\
& only leave the PLUGINS that are ONLY FREQUENTLY USED BY U (or
requests a program action withing the program)

Which in my case, i only have the plugins,

EWH32.api
Search*.api

rest....plugins move them to another folder (say:
ProgramFileDir\Adobe\Acrobat ver\plug_ins_disabled\ )

acrobat has grown something BEYOND just a reader into something BIG
with lots of attack vectors since ages.

best security practices ?
-bipin

On 9/13/06, David Kierznowski <david.kierznowski@...il.com> wrote:
> Recently, there has been alot of hype involving backdooring various
> web technologies. pdp (arcitect) has done alot of work centered around
> this area.
>
> I saw Jeremiah Grossman mention PDF's being "BAD", however, I was
> unable to easily locate any practical reasons as to why. I decided to
> investigate this a little further.
>
> This article discusses two possible backdoor techniques for Adobe
> Acrabat Reader and Professional. It includes proof of concept code and
> backdoored PDF documents.
>
> The article can be found here:
> http://michaeldaw.org/
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>


-- 

Bipin Gautam
http://bipin.tk

Zeroth law of security: The possibility of poking a system from lower
privilege is zero unless & until there is possibility of direct,
indirect or consequential communication between the two...

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ