lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <BAY129-F369D312273D4A0CB9CB5ABCBB70@phx.gbl>
Date: Tue, 25 Sep 2007 08:38:33 +0000
From: "cocoruder ." <frankruder@...mail.com>
To: full-disclosure@...ts.grok.org.uk
Subject: Re: 0day: PDF pwns Windows

yes I believe the vuls will most from the JS feature, and we (Fortinet 
Security Research Team) has finished our security review on Adobe 
Reader/Acrobat, with the vendor's process, we will release advisories some 
months too, expecting it!


welcome to my blog:
http://ruder.cdut.net





>From: "Eduardo Tongson" <propolice@...il.com>
>To: full-disclosure@...ts.grok.org.uk
>Subject: Re: [Full-disclosure] 0day: PDF pwns Windows
>Date: Sun, 23 Sep 2007 10:59:33 +0800
>
>That exploits the JavaScript [1] and open URI [2] feature through the
>Acrobat WebLink plug-in. Adobe put in JavaScript to PDF 1.3
>specifications for Forms interaction. Opening up the calculator should
>not be a feature [3].
>
>[1] /JS ({app.alert\("evil javascript active!"\);}\r{app.alert\("Oh
>wait! We aren\'t finished with you yet.."\);}\r)
>
>[2] /URI (www.nthelp.com/evil_browse.htm)
>
>[3] <http://projects.info-pull.com/moab/MOAB-06-01-2007.html>
>
>On 9/23/07, silky <michaelslists@...il.com> wrote:
> > On 9/22/07, Geo. <geoincidents@....net> wrote:
> > > > pa> http://www.gnucitizen.org/blog/0day-pdf-pwns-windows
> > > > Is this the way responsible disclosure works these days ?
> > > > "Adobe?s representatives can contact me from the usual place."
> > > >
> > > > Wow, now that's coordinated release. Knowing the bugs that you 
found
> > > > previously it should take 10 minutes to rediscover this one. Which
> > > > makes this even worse.
> > >
> > > I just saw his video showing the exploit fireing up calculator, it 
looks
> > > like the same stuff (feature/exploit call it what you want) that's 
been
> > > around for years. See www.nthelp.com/test.pdf (warning, it won't 
damage
> > > anything but it may scare you)
> >
> > ps, if anyone cares, this exploit does not work on foxit pdf reader 
v1.3.
> >
> > foxit rocks.
> >
> > so lets not call it a 'pdf' vuln, but a 'adobe acrobat' vuln.
> >
> >
> >
> >
> > > Geo.
> > >
> > > _______________________________________________
> > > Full-Disclosure - We believe in it.
> > > Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> > > Hosted and sponsored by Secunia - http://secunia.com/
> > >
> >
> >
> > --
> > mike
> > http://lets.coozi.com.au/
> >
> > _______________________________________________
> > Full-Disclosure - We believe in it.
> > Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> > Hosted and sponsored by Secunia - http://secunia.com/
> >
>
>_______________________________________________
>Full-Disclosure - We believe in it.
>Charter: http://lists.grok.org.uk/full-disclosure-charter.html
>Hosted and sponsored by Secunia - http://secunia.com/

_________________________________________________________________
免费下载 MSN Explorer:   http://explorer.msn.com/lccn  


_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ