Newest Adobe zero-day PDF exploit 'scary,' says researcher

Bypasses Windows DEP and ASLR defenses, comes with valid digital certificate

The exploit for a critical unpatched bug in Adobe Reader that's now circulating is "clever" and "impressive," security researchers said this week.

First uncovered on Tuesday by Washington-based researcher Mila Parkour, attackers are using rigged PDF documents that include code to exploit a zero-day vulnerability in the widely used Reader PDF viewer as well as in Acrobat, Adobe's PDF creation software.

The sophisticated exploit bypasses two important defenses that Microsoft erected to protect Windows, ASLR (address space layout randomization) and DEP (date execution prevention), researchers have confirmed.

"It's pretty clever," said Chet Wisniewski, a senior security adviser with software security firm Sophos. "It circumvents protections like ASLR and DEP. "Its techniques are certainly out of the ordinary and a lot more sophisticated than the garden variety [PDF] exploit."

The attack, which has been spotted attached to e-mails touting renowned golf coach and author David Leadbetter, also includes a malicious file that's digitally signed with a valid signature from Missouri-based Vantage Credit Union.

VeriSign has revoked the signature, but the already baked malware will still carry what appears to be a valid digital signature, Wisniewski said.

Vantage Credit Union's Web site now displays a message saying that users' access to their accounts via Intuit's Quicken and Microsoft's now-discontinued Money are "unavailable until further notice due to circumstances beyond our control," a sign that the financial firm's signature has been revoked.

Other researchers were also taken with the technical skills of the hacker who crafted the exploit and the trend it hinted at.

"The Adobe 0day exploit is pretty impressive," said noted vulnerability researcher Dino Dai Zovi on Twitter yesterday.

"So the Adobe 0day is using DEP+ASLR Bypass with a binary that is signed with stolen certificate!" said "Neeraj," who works as a senior security research engineer for Nevis Network, an Indian firm. "That's how future attacks gonna be. Scary!"

Although most researchers have pointed out that the current attacks have likely been aimed at specific individuals or companies -- "targeted," in security parlance -- hackers will probably quickly expand the range of victims and the size of their assaults, Wisniewski said. "Now that the cat's out of the bag, I'd expect to see more," he said.

A working exploit was added to the open-source Metasploit penetration testing kit Thursday and revised earlier Friday to run reliably on Windows Vista and Windows 7 systems, and to launch from a browser , said HD Moore , the chief security officer for Rapid7 and the creator of Metasploit.

The Metasploit exploit was written by researcher Joshua Drake , who noted Thursday that the current in-the-wild exploit can compromise a Windows PC if its user only previews the rigged PDF.

Adobe warned Reader and Acrobat users Tuesday of the vulnerability, but has not said when it would patch the bug. Nor has it offered any advice to stymie attacks.

Wisniewski said disabling JavaScript in Reader and Acrobat blocked the current exploit, but may not protect people against future attacks.

To disable JavaScript in Adobe Reader or Acrobat on Windows, users must select Preferences from the Edit menu, choose "JavaScript," then uncheck the "Enable Acrobat JavaScript" option. (On the Mac, Preferences is under the "Adobe Reader" or "Adobe Acrobat" menus.)

Another workaround suggested by the SANS Institute is to install the gPDF browser add-on , which opens any Web-hosted PDF in Google Docs' viewer rather than call on the Adobe Reader browser plug-in. gPDF is available in versions for Firefox and Chrome, and can also be run on Safari and Opera using available Greasemonkey scripts.

Wisniewski also said that there was evidence that the hacker had been working on the exploit for almost a year. "The DLL that it drops was [digitally] signed in 2009, so that part of it at least isn't brand new," he said. "That doesn't mean the exploit itself was available back then, but is another indication of a targeted attack."

He compared the Reader zero-day exploit with the Stuxnet worm, which caused concern in July when it was discovered attacking industrial control systems at large manufacturing and utility companies. Symantec traced Stuxnet back to June 2009 , with attacks likely beginning the following month, when hackers apparently stole digital certificate keys from a pair of Taiwanese software firms, then used them to sign two versions of the worm.

"This makes two [attacks] that have used valid certificates," Wisniewski said. "I'm starting to wonder if [hackers] aren't using other malware that's specifically targeting certificates and their keys."

Join the PC World newsletter!

Error: Please check your email address.

Tags sophosVeriSignsecurityMicrosoft

Struggling for Christmas presents this year? Check out our Christmas Gift Guide for some top tech suggestions and more.

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Gregg Keizer

Computerworld (US)

Most Popular Reviews

Follow Us

Best Deals on GoodGearGuide

Shopping.com

Latest News Articles

Resources

GGG Evaluation Team

Kathy Cassidy

STYLISTIC Q702

First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni

STYLISTIC Q572

For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell

LIFEBOOK UH574

The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi

STYLISTIC Q702

The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott

STYLISTIC Q702

My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Latest Jobs

Shopping.com

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?