Zero-day Adobe PDF peril goes click free
Thumbnail preview threat
An unpatched flaw in Adobe Acrobat and Reader might be exploited without even needing to trick a surfer into opening a maliciously constructed file.
Proof of concept demonstrations of this by security blogger Didier Stevens will increase pressure on Adobe to release a fix ahead of schedule.
The exploit techniques demoed by Stevens make use of the Windows Explorer Shell Extension installed with Adobe Reader. The feature creates a conduit between Adobe Reader and Windows Explorer and means that simply hovering the mouse cursor over a booby-trapped file, or selecting it, are enough to allow the bust out of potentially malicious code. Selecting a thumbnail view poses a similar risk.
In all three scenarios the problem exists because simply reading a maliciously constructed document is enough to trigger code execution.
Stevens explains these approaches to hacking in much greater depth in a blog posting, featuring a video demo, here.
Adobe admitted the security patch last week but said an official patch wouldn't be available until 11 March. The delay is all the more serious because hackers are actively attacking the flaw, thus far using approaches that mean maliciously constructed files need to be actually opened. ®
Sponsored: Transform Your IT Infrastructure