Call us Toll Free (USA): 1-833-844-9468     International: +1-603-280-4451 M-F 8am to 6pm EST

Adobe Systems’ Reader vulnerability reveals where a PDF is opened

By Pierluigi Paganini, Editor-in-Chief, CDM

May 1, 2013, 11:30 am EST

The McAfee security firm found an Adobe Reader vulnerability that reveals where a PDF document is opened.

The McAfee security firm found an Adobe Reader vulnerability that reveals where a PDF document is opened, once again Adobe products are the center of attention of security experts after the numerous attacks that have exploited flaws in its products for cyber espionage campaigns.

McAfee provided only general information to the press for obvious reasons not supplying details of the Adobe Reader vulnerability that affect all Adobe Reader versions, including last one.

It must be clear that the Adobe Reader vulnerability discovered doesn’t allow remote code execution, anyway McAfee consider it a security issue and have alerted the Adobe Company.

The blog post reported:

“Recently, we detected some unusual PDF samples. After some investigation, we successfully identified that the samples are exploiting an unpatched security issue in every version of Adobe Reader including the latest “sandboxed” Reader XI (11.0.2). Although the issue is not a serious problem (such as allowing code execution), it does let people track the usage of a PDF. Specifically, it allows the sender to see when and where the PDF is opened.”

The anomalous behavior is observable when the launches a link to another file path, which calls on a JavaScript API. The Adobe Reader displays a security warning to inform the user that he is going to open an external resource such as an Internet URL.

Security

The Reader doesn’t provide information on the availability of the external resource, if doesn’t exist in fact the API doesn’t display any message and returns any TCP traffic.

TCP

Haifei Li, author of the post, revealed that it is possible to manipulate a parameter of the API to obtain information on the document such as the location of a document on a system (using the JavaScript call this.path).

The information could be collected by the attacker to gather information on the target as explained in the post:

“Malicious senders could exploit this vulnerability to collect sensitive information such as IP address, Internet service provider or even the victim’s computing routine,” Li wrote. “In addition, our analysis suggests that more information could be collected by calling various PDF JavaScript APIs.”

“An APT [advanced persistent threat] attack usually consists of several sophisticated steps. The first step is often collecting information from the victim; this issue opens the door.”

McAfee suggests to the users to disable JavaScript in Reader until the patch will be released.

(Source: CDM & Security Affairs – Security)

cyberdefensegenius - ai chatbot

13th Anniversary Global InfoSec Awards for 2025 now open for early bird packages! Winners Announced during RSAC 2025...

X