Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Security Microsoft Software News

Microsoft Helps Adobe Block PDF Zero-Day Exploit 93

CWmike writes "Microsoft has urged Windows users to block ongoing attacks against Adobe's popular PDF viewer by deploying one of Microsoft's enterprise tools. Adobe echoed Microsoft's advice, saying the Enhanced Migration Experience Toolkit (EMET) would stymie attacks targeting Reader and Acrobat. Called 'scary' and 'clever,' the in-the-wild exploit went public last week when security researcher Mila Parkour reported it to Adobe after analyzing a rogue PDF document attached to spam. Adobe first warned users Wednesday of the threat, but at the time gave users no advice on how to protect themselves until a patch was ready. Microsoft stepped in on Friday. 'The good news is that if you have EMET enabled ... it blocks this exploit,' said Fermin Serna and Andrew Roths, two engineers with the Microsoft Security Response Center in an entry on the group's blog." A Symantec blog post suggests the people exploiting this vulnerability may be the 'Aurora' group responsible for the attacks on Google late last year.
This discussion has been archived. No new comments can be posted.

Microsoft Helps Adobe Block PDF Zero-Day Exploit

Comments Filter:
  • by mcgrew ( 92797 ) * on Monday September 13, 2010 @03:44PM (#33564848) Homepage Journal

    When you're well past a week old, why the fuck do you keep calling it 0 day?

    Because it was exploitable on day zero. It's a week old zero day exploit.

  • by revlayle ( 964221 ) on Monday September 13, 2010 @04:18PM (#33565260)
    Foxit insists on installing toolbars and special search engines these days... don't like it one bit.
  • ASLR (Score:5, Informative)

    by js3 ( 319268 ) on Monday September 13, 2010 @04:27PM (#33565354)

    According to the article..

      "Normally Address Space Layout Randomization (ASLR) would help prevent successful exploitation. However, this product ships with a DLL (icucnv36.dll) that doesn’t have ASLR turned on."

    So enable ASLR on the effing DLL and release a patch, problem solved? Nothing would make me work overtime and on the weekend than a highly visible level 1 bug. Adobe developers must have it good!

  • by Eudeyrn ( 1566735 ) on Monday September 13, 2010 @04:56PM (#33565684)
    Sumatra [kowalczyk.info] is my PDF reader of choice now. The program consists of a single executable, it's open source and GPL'ed. As long as you all you need to do is load and read PDFs (imagine that, a PDF reader that just reads PDFs), it gets the job done beautifully.
  • by rts008 ( 812749 ) on Monday September 13, 2010 @05:42PM (#33566146) Journal

    What's your point?

    At least 'mcgrew' offered a possible solution...so, where's your 'help the rest of the world' solution?

    Put up, or shut up, you hypocrite.
    You are actively working against your implied cause.

    I also use Foxit, and learned about it years ago right here on /., from someone like 'mcgrew', making a similar comment.

    The only benefit I got from your comment is you are an asshat, just for the sake of being an asshat.

  • by gad_zuki! ( 70830 ) on Monday September 13, 2010 @05:48PM (#33566216)

    You know, Foxit does this. It enables 'secure reading mode' when you open a PDF from the browser. Adobe should copy this feature, but instead they keep talking about a complex sandboxing scheme for their app.

    I'd rather they put in a mode like this, but they won't. Why? Because all those features it disables have been engineered by Adobe and as such they have performed a defacto extension of the PDF spec. Disabling this feature is admission that Adobe is incompetent and that people can live without js/flash embedding and mailable forms.

    So Adobe's management is all about promoting their features and they don't care much about security. They figure the update process will take care of it, but it doesn't. Heck, Reader doesn't even auto-update itself. You need to manually run the updater once and then it lives in your tray asking you to do the update. End users don't update typically. MS learned that the only way to get them to do it is to enable auto-update by default and they've been doing this since XP SP2.

    So now everything is hinged on this sandbox mode that lets them have their cake and eat it too. They want all sorts of insecure features and security. They think they can continue business as usual and the sandboxing will protect everyone. Dunno, this seems to be a pretty big gamble to me. Instead of a simple secure reading mode and setting auto-update to default, they're going the sandbox route. I suspect this really won't help and malware writers will find ways outside the sandbox.

  • Comment removed (Score:3, Informative)

    by account_deleted ( 4530225 ) on Monday September 13, 2010 @05:57PM (#33566320)
    Comment removed based on user account deletion

The key elements in human thinking are not numbers but labels of fuzzy sets. -- L. Zadeh

Working...