PCMag.com PCMag.com Blogs Security Watch PCMag Digital Network
  SEARCH 
Security Watch  
PCMAG.COM 
Subscribe to
Security Watch

Our FREE email newsletter delivered to your inbox.
Email: 
Format: 
 
Security Watch on Twitter
Share More...
Categories:  

reader_icon_special.jpgPDF researcher Didier Stevens has been working lately on ways to execute arbitrary code out of PDF files and has come up with a new and surprising one: He can run an executable embedded inside a PDF without exploiting a vulnerability. Stevens isn't revealing the details of the technique yet.



pdfdialig.jpg

Different PDF readers react differently to the technique. Adobe reader displays the warning dialog above. Stevens can make the attack more likely to succeed by changing the contents of the box: Instead of the file name it could say "Please click Open" or some other social engineering message.

But Foxit Reader, which many users have switched to, supposedly for security reasons, doesn't even display a warning dialog. It just automatically executes the embedded EXE. A commenter to Stevens's post gives a story of a related vulnerability, and Stevens says it's not uncommon for Foxit to blindly execute dangerous activities in cases where Adobe's software warns the user.

I also tested Nuance's free PDF reader. It said opens a dialog box that says cannot open file "cmd.exe".

Update: Stevens tells me that he was able to get the attack working in Nuance by hard-coding the location of cmd.exe.

If there really is no vulnerability involved then we'll have to wait and see what approach Adobe and other vendors take to this issue. Adobe could just choose to identify it more precisely and give a stronger warning dialog box. Foxit could choose to do something, anything.

Posted by: Tony Austin
April 9, 2010 9:59 PM

How about Tracker Software's PDF-XChange Viewer (which I use now rather than Foxit Reader, due to superior features): http://www.docu-track.com/product/pdf-xchange-viewer


* = required

(If you haven't left a comment here before, you may need to be approved by the site owner before your comment will appear. Until then, it won't appear on the entry. Thanks for waiting.)

    Remember Me?
  
Please keep your comments on topic. Intelligent, thoughtful comments and questions are appreciated. Comments that contain personal attacks or profanity may be edited or removed. Comments containing personal information such as phone numbers, credit card numbers, or addresses may be edited or removed. Comments with advertisements will be removed.


         
 
  Ziff Davis Home | Contact Us | Advertise | Link to Us | Newsletters | RSS Feeds | Ziff Davis International
Digital Edition Customer Service | Subscribe to PCMag Digital Edition | Reprints
AppScout | Cranky Geeks | DigitalLife | DL.TV | ExtremeTech | GearLog | GoodCleanTech | PC Magazine | PCMagCasts | Security Watch | Smart Device Central | TechSaver
AppScout Mobile | Gearlog Mobile | GoodCleanTech Mobile | PCMag.com Mobile
Privacy Policy | Terms of Service | Linking Policy | Contact Us | AdChoices
Copyright © 1996-2011 Ziff Davis, Inc. All Rights Reserved. Ziff Davis, the Ziff Davis logo and Security Watch are registered trademarks of Ziff Davis, Inc. Reproduction in whole or in part in any form or medium without express written permission of Ziff Davis, Inc. is prohibited.