Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Security

No JavaScript Needed For New Adobe Exploits 187

bl8n8r writes "More woes for Adobe as a security firm creates a proof-of-concept attack that injects malicious code as part of the update process. The user only needs to click a dialog box to execute the code and no JavaScript is needed to launch the exploit. The exploit affects Foxit as well as Adobe Acrobat software. This exploit is made possible through the host software allowing execution of system binaries. Not clear if it's multi-platform, but seems plausible."
This discussion has been archived. No new comments can be posted.

No JavaScript Needed For New Adobe Exploits

Comments Filter:
  • Microsoft to Blame (Score:2, Insightful)

    by MyLongNickName ( 822545 ) on Tuesday April 06, 2010 @12:01PM (#31749186) Journal

    As has alreay been pointed out, the worst this "exploit" can do is elevate to the same rights as the user. As anyone with a CS degree (or even any true IT experience) would know, these rights should be limited.

    Now, Microsoft has for DECADES pushed the paradigm of giving the user administrative rights. Sure, they are making solf half-hearted attempts now to change this. But they created an environment of 3rd party software relying on this full rights model... and it is biting us all on the butt.

    So, as usual, Microsoft is to blame.

  • by headkase ( 533448 ) on Tuesday April 06, 2010 @12:11PM (#31749324)
    Linux is a lot different than running as root all the time on Windows. My security updates are pushed to me as they are fixed, not even pushing up to a month of vulnerability to patch unlike some systems meant to make corporate IT admins happy. All popular Linux distributions have an updating function: you get your security patches and patches to everything else in your repositories a lot more consistently than Windows. To deny this shows unfamiliarity with Linux. Thats even before you get into functions like selinux and apparmor which happen to be standard on my flavor. For everyone. This is also an Adobe bug, and doesn't affect most Linux PDF readers as far as I'm aware and even if it did I'd have a lot more faith that the Linux ones would be rendered immune more globally than the hodgepodge of updating (or lack of) systems on Windows. You're pointing the finger at Linux and saying: "You're vulnerable too!" But in the practical real world it is a case of not.
  • by sopssa ( 1498795 ) * <sopssa@email.com> on Tuesday April 06, 2010 @12:13PM (#31749354) Journal

    Most malware doesn't need root/admin access. It's only needed if you want to pwn or hack the server. Malware on the other hand runs just happily in userland too.

  • by sopssa ( 1498795 ) * <sopssa@email.com> on Tuesday April 06, 2010 @12:19PM (#31749468) Journal

    It's not an Adobe bug, it's a feature in the PDF specs that can be exploited with user stupidity. That's the point I've been trying to made, no OS unless it's completely locked down a la iPhone will protect you from user stupidity. Not Windows, not Linux, not BSD.

    Maybe Ubuntu pushes updates itself, but Debian, Fedora and CentOS doesn't. Not for me at least, and I haven't changed anything regarding that. If you want to update, you need to type in the yum update or apt-get update commands manually. And thats before we even get to programs or distros that have you compile themself and you have to make sure to periodically check them and keep them up to date.

  • by The End Of Days ( 1243248 ) on Tuesday April 06, 2010 @12:19PM (#31749470)

    You don't run as administrator in Windows anymore, either. Security updates are likewise pushed in windows. Windows has an updating function. Your statements all show unfamiliarity with Windows.

    This is not an Adobe bug, this is a vulnerability in the PDF spec. Readers not from Adobe have already been shown to be vulnerable.

    Linux is not immune, despite your specious claims.

  • Re:Solution (Score:5, Insightful)

    by Yvanhoe ( 564877 ) on Tuesday April 06, 2010 @12:23PM (#31749536) Journal

    The attack requires the user of the computer to allow the code to be executed by agreeing to it via a dialog box. However, the attacker could at least partially control the content of the dialog box that appears to prompt the user to launch the executable and thus use social engineering to entice the computer user to agree to execute the malware, said Conway.

    Solution : stop accepting that documents should execute binaries in order to display properly.

  • Re:Code, meet data (Score:3, Insightful)

    by Tridus ( 79566 ) on Tuesday April 06, 2010 @12:24PM (#31749560) Homepage

    Because some genius thought that it was a great idea to put a launch command in the PDF spec.

    Seems like it's working as intended.

  • by sopssa ( 1498795 ) * <sopssa@email.com> on Tuesday April 06, 2010 @12:41PM (#31749810) Journal

    Xpdf and Okular on Windows aren't vulnerable either.
    Adobe PDF Reader on Linux is vulnerable.

    This goes to show that it doesn't matter which the OS is, as it's mostly about software or user stupidity. Windows and Linux are on par in this, neither one is better than the another. There is SELinux for Linux which can mitigate the issue, but there are such tools and settings for Windows too. Not that any casual user will put up with those in either system.

  • by gzipped_tar ( 1151931 ) on Tuesday April 06, 2010 @12:56PM (#31750028) Journal

    > so it all boils down to how knowledgeable the user is about security

    But you're the one who brought up this "Linux makes creating malware handier and stealthier" argument, and you're now resorting to the same old, tiring "user incompetence" excuse?

    And did you just pulled that argument from your ass, or have you actually worked on malware on Linux, Windows and Mac OS X and compared them before making that post?

    And yes, some people are creating a false sense of security around Linux. But aren't you creating a false sense of threat as well?

    It is not Linux that has made malware more threatening. Incompetent design (like this) and poor programming practice make has made malware possible, on all platforms, and now the popularity (or rather, low cost) of incompetent design and poor programming is making it rampant.

    But next perhaps someone will tell me that Linux is doomed because most distros ship gcc and gdb by default and they're used to create malware.

  • by Mister Whirly ( 964219 ) on Tuesday April 06, 2010 @01:31PM (#31750592) Homepage
    To pretend that one OS is inherently superior in security over another also borders on incredulous. Anytime a specific OS is mentioned in a security discussion, that person has lost the discussion, and does not understand the entire concept of security. Security isn't software. Security isn't an operating system. Security is a set of practices and policies that apply to all software and operating systems regardless of what specific type they are.

Always draw your curves, then plot your reading.

Working...