From: Virus Guy on
-----------------
See also:

http://blog.didierstevens.com/2010/03/29/escape-from-pdf/

Provided is a proof-of-concept pfd file that opens a command shell when
opened.

This file does not function properly on win-98 running Acrobat 6.02
reader. Instead, this error message is displayed: "There was an error
opening this document. The file is damaged and could not be repaired."

Possible reason is that "cmd.exe" is an invalid command under win-98.
------------------

http://news.cnet.com/8301-27080_3-20001792-245.html

Portable Document Format (PDF) files could be used to spread malware to
clean PDF files stored on a target computer running Adobe Acrobat Reader
or Foxit Reader PDF software, a security researcher warned on Monday.

Jeremy Conway, product manager at NitroSecurity, created a proof of
concept for an attack in which malicious code is injected into a file on
a computer as part of an incremental update, but which could be used to
inject malicious code into any or all PDF files on a computer.

The attack requires the user of the computer to allow the code to be
executed by agreeing to it via a dialog box. However, the attacker could
at least partially control the content of the dialog box that appears to
prompt the user to launch the executable and thus use social engineering
to entice the computer user to agree to execute the malware, said
Conway.

Turning off JavaScript would not prevent the attack. It also does not
require that the attacker exploit a vulnerability in the PDF reader
itself.

The PDF reader incremental update capability "can be used as an
infection vector," said Conway. The attack "does not exploit a
vulnerability. No crazy Zero-Day (exploit) is needed to make this work."

Conway's proof of concept attack--detailed here with more information
here--takes advantage of the same weakness in PDF readers that security
researcher Didier Stevens of Belgium discovered a week ago and explained
on his blog.

Stevens was able to launch a command and run an executable within a PDF
file using a multi-part scripting process. As a result of that research
and blog post, researchers at Adobe and Foxit Software are investigating
ways to mitigate the risks from such attacks, according to CNET sister
site ZDNet.

An Adobe spokeswoman did not have a comment on Conway's hack, but ZDNet
posted Adobe's comment on Stevens':

"Didier Stevens' demo relies on functionality defined in the PDF
specification, which is an ISO standard (ISO PDF 32000-1:2008)," the
statement said. "Section 12.6.4.5 of the specification defines the
/launch command. This is an example of powerful functionality relied on
by some users that also carries potential risks when used incorrectly.
The warning message provided in Adobe Reader and Adobe Acrobat includes
strong wording advising users to only open and execute the file if it
comes from a trusted source. Adobe takes the security of our products
and technologies very seriously; we are always evaluating ways to allow
end-users and administrators to better manage and configure features
like this one to mitigate potential associated risks."

Foxit provided ZDNet this comment:

"Foxit takes every security concern seriously and we focus our
engineering resources at determining the cause of the problem and coming
up with a complete and safe solution. Upon hearing of a possible
security concern, our development team went to work and a resolution was
determined in less than 24 hours and an updated version of the Foxit
Reader will be made public in the next 72 hours."

The problem results from the PDF reader software allowing executable
files to be opened or launched from within the program, according to
Conway. "Most users don't use that additional functionality," he said.

He suggested that PDF software firms could provide a "minimalistic"
version of the PDF readers that do not allow other types of programs to
be launched and allow users to decide which specific types of
executables they want to be able to open within the program.

Update April 6 9:15 a.m. PDT: An Adobe spokeswoman replied Monday night
with the same statement above and this: "Users can also turn off this
functionality in the Adobe Reader and Adobe Acrobat Preferences by
selecting > Edit > Preferences > Categories > Trust Manager > PDF File
Attachments and clearing the box 'Allow opening of non-PDF file
attachments with external applications.'"
From: Virus Guy on
Virus Guy wrote:

> Provided is a proof-of-concept pdf file that opens a command shell
> when opened.
>
> This file does not function properly on win-98 running Acrobat 6.02
> reader. Instead, this error message is displayed: "There was an
> error opening this document. The file is damaged and could not be
> repaired."
>
> Possible reason is that "cmd.exe" is an invalid command under win-98.

Apparently that's not the reason. I copied calc.exe to cmd.exe and
still got the same error.
From: Virus Guy on
me(a)tadyatam.invalid wrote:

> What version is the PDF file?

I don't know. The first few characters of the file is %PDF-1.1.

> Some ver's of AR give "... error opening ..." because they
> can't handle later version(s) of .PDFs.

I have yet to encounter a pdf file that AR 6.x can't open.

Sure, I almost always get this message:

------------
The file appears to use a new format that this version of Acrobat does
not support. It may not open or display correctly. Adobe recommends
that you upgrade to the latest version of our acrobat products. yada
yada yada
------------

There is a "do not show this message again" check-box, but it only
applies to the particular pdf file that's being opened. The message
will appear again for the next new pdf file being opened.

I blow the message away and the file opens perfectly. It's a lot of
bullshit courtesy of Adobe.

I think there's a hack for AR 6.x where that message can be permanently
turned off.

By the way - will it blend?

http://www.liveleak.com/view?i=b07_1270575942
 | 
Pages: 1
Prev: Yes I felt it!
Next: "Antivirus Suite" malware