Good Morning, Foxit Corp has added new security features to its alternative PDF reader software to help thwart recent malware attacks<http://threatpost.com/en_us/blogs/pdf-malware-using-new-attack-technique-042810> that exploit the “/launch” feature.
With Foxit PDF Reader Version 3.3, the company has added a Safe Mode that blocks external commands from being executed by the software. The Safe Mode is a key part of a new Trust Manager in the Foxit PDF Reader. [ SEE: The real dangers of PDF executable trickery<http://www.zdnet.com/blog/security/the-real-dangers-of-pdf-executable-trickery/6055> ] Earlier this month, Foxit Reader adopted a warning message<http://blogs.zdnet.com/security/?p=5985> before running any executable command embedded in a PDF document The changes follow the discovery by researcher Didier Stevens that dangerous executables can be embedded into PDF files (and executed) without exploiting any vulnerabilities. [ SEE: Hacker finds a way to exploit PDF files, without a vulnerability<http://blogs.zdnet.com/security/?p=5929> ] The PDF hack, when combined with clever social engineering techniques, allowed code execution attacks if a user simply opens a rigged PDF file. Soon after, malicious hackers pounced on the trick and started launching malware attacks. Adobe has offered a workaround <http://blogs.zdnet.com/security/?p=6028> for the issue and is considering a better fix in a future version of its ubiquitous Reader software. Source:http://www.zdnet.com Regards, 0xN41K -- You received this message because you are subscribed to the Google Groups "nforceit" group. To post to this group, send an email to [email protected]. To unsubscribe from this group, send email to [email protected]. For more options, visit this group at http://groups.google.com/group/nforceit?hl=en-GB.
