Adobe PDF exploit infects 'many thousands,' says researcher

Attackers have been exploiting one of the recently-revealed vulnerabilities in Adobe Reader for at least three weeks, security researchers said today, with one estimating the infection count at "many thousands" so far.

On Tuesday, Adobe Systems Inc. acknowledged that its popular PDF viewer sported several flaws, and patched them that same day. However, it has yet to spell out the exact number or nature of the bugs.

But one of those vulnerabilities has been actively exploited since at least Jan. 20, said researchers at the SANS Institute's Internet Storm Center (ISC) and VeriSign's iDefense unit. According to Raul Siles, an analyst with ISC, a malicious PDF (Portable Document Format) file has been spreading a Trojan horse from a server based in the Netherlands. The first evidence of the attack, said Siles, came in a Jan. 20 message on an Italian message forum from a user who noted that three of his PCs had been infected, and the attack was traced back to the Dutch IP address.

Siles quoted e-mail he received from iDefense researchers, who said that the malware, a variation of the "Zonebac" Trojan horse, disables a slew of antivirus programs and modifies search results and banner ads.

On Friday, iDefense issued three security advisories that provided more information about some of the vulnerabilities that Adobe patched last week. Crediting iDefense researcher Greg MacManus with finding and reporting the bugs last September and October, the advisories said that the vulnerabilities were in Adobe Reader's handling of JavaScript and in how it refers to libraries that provide encryption and signature verification.

One of the two advisories that cited JavaScript flaws said there were "multiple stack-based buffer overflows in JavaScript methods" within Adobe Reader and Adobe Acrobat, a more advanced application that sells for US$299 and up. "Exploitation of these vulnerabilities would allow an attacker to execute arbitrary code as the current user," the iDefense advisory said.

The Jan. 20 attack mentioned on the Italian forum exploited one of those JavaScript vulnerabilities. Presumably, the proof-of-concept exploit that Immunity Inc. researcher Kostya Kortchinsky crafted last week also took advantage of one of the iDefense-reported stack overflows. Immunity labeled the revised, fully-functional exploit as "JavaScript Stack Overflow" when it released it to CANVAS Early Updates subscribers on Thursday.

Symantec weighed in as well when one of its researchers, Hon Lau, said that the attacks in progress might have originated from malicious ads on hacked sites or from compromised legitimate sites that redirected users to a rigged PDF file via JavaScript or an iFrame. Attackers may also try to trick users into opening PDF files attached to spam, he added.

Although Lau did not cite specific figures, he put the victim tally as "many thousands" and warned users to patch Adobe Reader and Acrobat promptly. "It appears that this PDF-based attack has been quite successful affecting many thousands of users throughout the world," Lau said on the Symantec security blog Saturday.

Lau also speculated that details of the vulnerabilities had leaked before Adobe could patch them. "While it appears that the vulnerabilities were disclosed in a responsible manner, i.e. [the] vendor was informed and allowed to patch before official announcement, the swiftness of the exploit appearing in the wild could suggest that leaks had occurred," Lau maintained.

On Thursday, Adobe added a security advisory to its Web site, but the new alert did not provide any additional details on the vulnerabilities it had patched. In the advisory, Adobe credited iDefense's MacManus, as well as researchers at Google, Fortinet, 3Com's TippingPoint unit and Security-Assessment.com, a New Zealand-based security consultancy, for reporting the bugs.

The new Reader 8.1.2, which can be downloaded from the Adobe Web site or retrieved using the updater bundled with Reader, targets Windows and Mac OS X users. Adobe does not yet have a patched Version 7 of the application, but it said one would be made available at some point.

Join the newsletter!

Error: Please check your email address.
Rocket to Success - Your 10 Tips for Smarter ERP System Selection
Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Gregg Keizer

Computerworld
Show Comments

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Ben Ramsden

Sharp PN-40TC1 Huddle Board

Brainstorming, innovation, problem solving, and negotiation have all become much more productive and valuable if people can easily collaborate in real time with minimal friction.

Sarah Ieroianni

Brother QL-820NWB Professional Label Printer

The print quality also does not disappoint, it’s clear, bold, doesn’t smudge and the text is perfectly sized.

Ratchada Dunn

Sharp PN-40TC1 Huddle Board

The Huddle Board’s built in program; Sharp Touch Viewing software allows us to easily manipulate and edit our documents (jpegs and PDFs) all at the same time on the dashboard.

George Khoury

Sharp PN-40TC1 Huddle Board

The biggest perks for me would be that it comes with easy to use and comprehensive programs that make the collaboration process a whole lot more intuitive and organic

David Coyle

Brother PocketJet PJ-773 A4 Portable Thermal Printer

I rate the printer as a 5 out of 5 stars as it has been able to fit seamlessly into my busy and mobile lifestyle.

Kurt Hegetschweiler

Brother PocketJet PJ-773 A4 Portable Thermal Printer

It’s perfect for mobile workers. Just take it out — it’s small enough to sit anywhere — turn it on, load a sheet of paper, and start printing.

Featured Content

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?