Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Adobe loses security grip and falls to earth
Techworld.com ^ | December 15, 2004 | Techworld staff

Posted on 12/15/2004 7:00:59 AM PST by holymoly

Acrobat and also Ethereal suffer vulnerability alerts.

Adobe has patched two bugs in its ubiquitous Acrobat Reader application that could allow an attacker to take over a user's system via a malicious pdf file attached to an e-mail message. The bugs affect Windows, Mac OS X and Unix.

Separately, developers warned of bugs in Ethereal, a popular network protocol analyser, that could allow an attacker to take over a system.

Security research company iDefense warned of the bug affecting Windows and Mac in an advisory published on the Bugtraq mailing list late on Tuesday. The problem is a format string vulnerability in version 6.0.2 of Adobe Reader, allowing users to craft a special .etd file that could cause an invalid memory access and allow for the execution of malicious code with the privileges of the user. Reader uses .etd files in handling eBooks.

The bug could be exploited by an e-mail containing either a malicious pdf file or a link to such a file, according to iDefense. The company said earlier versions of Reader 6 could be vulnerable, and said the bug is likely to also affect Adobe Acrobat, the application used to create pdf files.

Adobe released a fix in version 6.0.3 of both Acrobat and Acrobat Reader for Windows and Mac OS X. All the updates are available from Adobe's Web site.

iDefense said users could also work around the problem by deleting the file "C:\Program Files\Adobe\Acrobat 6.0\Reader\plug_ins\eBook.api", which makes Reader and Acrobat unable to handle eBooks.

A similar bug affects Unix. A boundary error in the "mailListIsPdf()" function, which checks to see whether a document in an email is a PDF file, unsafely copies user supplied data into a fixed sized buffer, according to iDefense.

This could allow an attacker to cause a buffer overflow and execute malicious code, the company said. Adobe has fixed the bug in Acrobat Reader version 5.0.9 for Unix, available on its site. iDefense said previous versions of Reader 5 are likely to also be affected. In its advisory, iDefense included a shell script patch users can apply for additional protection.

Ethereal bug

Several bugs were also reported in Ethereal, which claims to be one of the most popular tools for network software and protocol development, troubleshooting and analysis. The bugs can make the application hang, crash or otherwise disrupt a system, and may also allow allow for malicious code execution, Ethereal's developers said.

"It may be possible to make Ethereal crash or run arbitrary code by injecting a purposefully malformed packet onto the wire or by convincing someone to read a malformed packet trace file," the project said in a Wednesday advisory.

The bugs affect versions 0.9.0 up to and including 0.10.7, and are fixed in version 0.10.8. Secunia, which publishes an independent security database, said the problems were "highly critical".


TOPICS: News/Current Events
KEYWORDS: acrobat; adobe; adobereader; cybersecurity; flaw; pdf; security
Navigation: use the links below to view more comments.
first previous 1-2021-4041-50 last
To: Bush2000
Everyone here has witnessed the countless diatribes of Mac and Linux bigots, railing against Windows and/or Microsoft -- pleading with people to 'just switch...' -- while insisting that 'their platform isn't vulnerable to viruses, worms, and malware.

Post one, please I beg you post up one example (after all they are countless) where someone does not say less vulnerable, but not at all vulnerable.. Stop making stuff up.

41 posted on 12/16/2004 4:01:14 PM PST by N3WBI3
[ Post Reply | Private Reply | To 39 | View Replies]

To: N3WBI3; Izzy Dunne
Here's a perfect example of someone who thinks that the Mac is invulnerable to viruses.
42 posted on 12/16/2004 4:12:36 PM PST by Bush2000
[ Post Reply | Private Reply | To 41 | View Replies]

To: ThinkDifferent
But I wouldn't be surprised if Microsoft at least makes an attempt to do something like this in the near future, given the increasing malware problems.

I'm not really sure it's doable, though, as you describe it. Nor am I sure that something that drastic is really necessary. Security is a process, not a product, and the keys to the process are education for users about safer computing, and tools that effectively promote safer computing.

Perfect example: the Half-Life 2 Steam client. It will not run on user-level accounts or lower on either XP or Win2k. This is because Steam expects to be able to write to HKEY_LOCAL_MACHINE when it installs, and expects to be able to write the Program Files folder when it updates itself or otherwise gets new content. Problem: user-level accounts (including "limited" accounts on XP-Home) do not have write access to Program Files or HKEY_LOCAL_MACHINE. Crappy design from Valve, to be sure, but there are two ways around that - either use "runas" to run that particular software with higher privileges, or you can give explicit write permissions to users for the Steam folder and that registry region (you probably would prefer to rewrite it so that you don't have to have users touching that portion of the registry, actually, but nevermind).

But most people don't know how to do either of those things to preserve some security, and even if they did, it's somewhat inconvenient, so they take the easy way out and simply run as administrators. In that case, both the software and the users are lacking - the software is lacking because it has a crappy design that requires the end-user to preserve security via workarounds, and the users are lacking because most of them don't know how to do those workarounds, or even why they should.

Good software design can help protect the system from clueless users, and savvy users can help protect the system from bad software design, but unfortunately, it's all too common to have neither. Instead, you wind up with the worst possible outcome - clueless users operating badly designed software.

43 posted on 12/16/2004 4:21:13 PM PST by general_re ("What's plausible to you is unimportant." - D'man)
[ Post Reply | Private Reply | To 37 | View Replies]

To: N3WBI3
Yet another one.
44 posted on 12/16/2004 4:24:17 PM PST by Bush2000
[ Post Reply | Private Reply | To 41 | View Replies]

To: Bush2000
Tell me exactly which unix virii can take over my G5?

Hmm so where in here is he saying that (A) Unix is invulnerable to attack, (B) OSX in invulnerable to attack, (C) Linux is invulnerable to attack?

Seems to me he is asking which UNIX Virii takes over macs? meaning there are not any out there right now. He did not say that a Mac is invulnerable to attack..

Nice try...

45 posted on 12/16/2004 4:34:09 PM PST by N3WBI3
[ Post Reply | Private Reply | To 44 | View Replies]

To: general_re
What you described happens sometimes on the Mac as well. Instead of an application keeping preferences and other stuff in the ~/Library folder where it should, it tries to write to the /Applications folder it resides in.

I just refuse to use software that does that. I'm sure I won't encounter any problems with a Half-Life II installation on my mac though. LOL! For the same reason no one encountered problems with Half-Life one on their macs.

46 posted on 12/16/2004 5:29:27 PM PST by avg_freeper (Gunga galunga. Gunga, gunga galunga)
[ Post Reply | Private Reply | To 43 | View Replies]

To: Bush2000
Well, while it is certainly possible to have an FTP process dump the contents of ~/. to a remote server, such attacks seem to be fairly rare in practice. No type of attack, be they remote or local should be shrugged off if one is to be smart about using one's computer. It is a lot harder to infect Unix computers though, as the systems are not generally set up to automatically execute code. Saving an attachment to disk called "runme.exe" isn't enough to make something executable.

In general, the overall security is simply better on Unix systems because there is almost never a need to login as root. That doesn't mean you can be completely complacent, but the target is a lot smaller. I update programs for which there are only local exploits just as religiously as I to those that are succeptable to remote exploits, not because I'm worried about anyone in my household taking advantage of them, but rather because it's just the smart thing to do.

Also, to come back to the point about having an ftp program that will dump your data remotely, there are quite a few tools out there that will alert you to such things. I keep a program open that presents a histogram of CPU usage, cache and internet usage (both incoming and outgoing), so I'd most likely notice if something lke that were going on. It's all about awareness IMO. If you are aware of what should be happening, you're far less likely to get bitten by things that shouldn't be.

47 posted on 12/16/2004 9:00:08 PM PST by zeugma (Come to the Dark Side...... We have cookies!)
[ Post Reply | Private Reply | To 38 | View Replies]

To: Bush2000
Here's a perfect example of someone who thinks that the Mac is invulnerable to viruses

Wrong. Thank you for playing.
The point I was making was not that Macs are invulnerable. The point is that they are less vulnerable for MORE reasons than the old "security by obscurity" logic my opponent was using.

But I'll bet you knew that.

48 posted on 12/17/2004 4:00:25 AM PST by Izzy Dunne (Hello, I'm a TAGLINE virus. Please help me spread by copying me into YOUR tag line.)
[ Post Reply | Private Reply | To 42 | View Replies]

To: Bush2000
Well Im still waiting, can you point out a post where someone actually says that OSX or Linux has not bugs and can not be attacked..

Comeon according to you they are all over the place..

49 posted on 12/17/2004 8:21:40 AM PST by N3WBI3
[ Post Reply | Private Reply | To 44 | View Replies]

To: holymoly

Adobe just released Acrobat Reader 7.0 which addresses the vulnerabilities of the previous version. Every one is urged to download and install it immediately to take advantage of the security enhancements as well as file reading improvements.


50 posted on 12/22/2004 1:23:37 AM PST by goldstategop (In Memory Of A Dearly Beloved Friend Who Lives On In My Heart Forever)
[ Post Reply | Private Reply | To 1 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-50 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson