Good Morning,

Foxit Corp has added new security features to its alternative PDF reader
software to help thwart recent malware
attacks<http://threatpost.com/en_us/blogs/pdf-malware-using-new-attack-technique-042810>
that
exploit  the “/launch” feature.

With Foxit PDF Reader Version 3.3, the company has added a Safe Mode that
blocks external commands from being executed by the software.

The Safe Mode is a key part of a new Trust Manager in the Foxit PDF Reader.
[ SEE: The real dangers of PDF executable
trickery<http://www.zdnet.com/blog/security/the-real-dangers-of-pdf-executable-trickery/6055>
 ]

Earlier this month, Foxit Reader adopted a warning
message<http://blogs.zdnet.com/security/?p=5985> before
running any executable command embedded in a PDF document

The changes follow the discovery by researcher Didier Stevens that dangerous
executables can be embedded into PDF files (and executed) without exploiting
any vulnerabilities.
[ SEE: Hacker finds a way to exploit PDF files, without a
vulnerability<http://blogs.zdnet.com/security/?p=5929>
 ]

The PDF hack, when combined with clever social engineering techniques,
 allowed code execution attacks if a user simply opens a rigged PDF file.
Soon after, malicious hackers pounced on the trick and started launching
malware attacks.

Adobe has offered a workaround <http://blogs.zdnet.com/security/?p=6028> for
the issue and is considering a better fix in a future version of its
ubiquitous Reader software.


Source:http://www.zdnet.com

Regards,

0xN41K

-- 
You received this message because you are subscribed to the Google Groups 
"nforceit" group.
To post to this group, send an email to [email protected].
To unsubscribe from this group, send email to 
[email protected].
For more options, visit this group at 
http://groups.google.com/group/nforceit?hl=en-GB.

Reply via email to