Adobe Reader X sandbox bypassed by zero-day flaw

Adobe Reader X sandbox bypassed by zero-day flaw

تاریخ ایجاد

ID: IRCNE2012111672
Date: 2012-11-10

According to “TechWorld”, criminals have gained access to a newly discovered flaw in Adobe’s Reader X program that can beat its sandboxing security isolation technology, Russian security firm Group-IB has claimed.
According to brief details posted on the company’s site, the zero-day vulnerability is now circulating in new versions of the notorious Blackhole Exploit Kit, the most significant distribution system for a host of malware types, including bank Trojans such as SypeEye and Zeus.
The fact that even patched versions of Reader X will be vulnerable to the flaw explains the reported price paid for knowledge of its workings, said to $30,000 to $50,000.
“For now this flaw is distributed only in only small circles of the underground but it has the potential for much larger post-exploitation methods,” noted Andrey Komarov of the Russian firm.
The malformed PDF exploitation described by Group-IB is not a perfect angle of attack and requires the user to close and re-open their browser before opening the file, a small inconvenience to undermine a protection mechanism – the sandbox – assumed until now to be a secure layer of protection. It does work without invoking Javascript, however.
First released in 2010, Reader X’s sandbox was designed to tighten up the woeful security that had afflicted the program until that point. It has largely succeeded, so much so that the sandboxing has been extended to programs such as Flash Player.
What isn’t clear is whether the sandbox vulnerability includes even recently-enhanced versions of the technology.
Adobe's Product Security Incident Response Team (PSIRT) has yet to respond to the flaw report.

برچسب‌ها