A security researcher has uncovered yet another vulnerability in Adobe
Reader that allows hackers to execute malicious code on computers by
tricking their users into opening booby-trapped files.

Charlie Miller, principal security analyst at Independent Security
Evaluators, disclosed the critical flaw at last week's Black Hat security
conference in Las Vegas. It stems from an integer overflow in a part of the
application that parses fonts, he said. That leads to a memory allocation
that's too small, allowing attackers to run code of their choosing on the
underlying machine. There are no reports of the flaw being targeted for
malicious purposes.
  
<http://ad.uk.doubleclick.net/jump/reg.security.4159/malware;tile=2;pos=top;dcove=d;sz=336x280;ord=TG4UgsCoZGMAACOPg5YAAAEc?>

Details of Miller's discovery come as hackers are exploiting a separate
font-parsing bug in the PDF reader built by Apple to jailbreak the latest
iPhone. While the hack is harmless, security firms including Symantec and
McAfee have warned that the underlying flaw, when combined with a second
one, could be used to execute malicious code on the Apple smartphone.

Apple has yet to acknowledge the vulnerabilities.

Brad Arkin, senior director of product security and privacy at Adobe, said
members of the company's security team attended Miller's talk and have since
confirmed his claims that the vulnerability can lead to remote code
execution. The team is in the process of developing a patch and deciding
whether to distribute it during Adobe's next scheduled update release or as
an “out-of-band” fix that would come out in the next few weeks.

Key to the decision is determining whether there are enough details
available from Miller's talk for the vulnerability to be exploited in
real-world attacks.

“Certainly, there's some information in the slides and screenshots of some
of the crash information,” Arkin told *The Register*. “As we evaluate what's
the right response, we're going to look in and decide is that information
sufficient and if so, how long would it take for someone with malicious
intent to convert that into an exploit.”

Miller's discovery is the latest to document a vulnerability in Adobe Reader
that puts its users at risk of attacks that can surreptitiously install
malware that steals passwords or other sensitive information. The
vulnerability affects versions for Windows, Unix, and Mac OS X.

Miller discussed the unpatched bug during a demonstration of a security
software tool called BitBlaze, which helps researchers analyze crash bugs.
The tool, was also instrumental in helping Miller gain insights into two
exploitable bugs in OpenOffice that remain unpatched. Slides from his talk
are here<http://securityevaluators.com/files/papers/CrashAnalysisSlides.pdf>,
and the white paper is
here<http://securityevaluators.com/files/papers/CrashAnalysis.pdf>.
®

-- 
Regards,
kishore sangaraju

-- 
You received this message because you are subscribed to the Google Groups 
"nforceit" group.
To post to this group, send an email to [email protected].
To unsubscribe from this group, send email to 
[email protected].
For more options, visit this group at 
http://groups.google.com/group/nforceit?hl=en-GB.

Reply via email to