XEROF

 

PDF vulnerability : how amateur


According to Zdnet,

extrait : "New PDFex attack can exfiltrate data from encrypted PDF files. All the 27 desktop and web PDF viewer apps that were tested were found to be vulnerable in a way or another."


And here is the culprit, from my point of view (emphasis mine) :

extrait : "The research team says that an attacker can tamper with these unencrypted fields and create a booby-trapped PDF file that when decrypted and opened will attempt to send the file's content back to an attacker. (...) by adding a PDF form that auto-submits the PDF's content to an attacker's server when the victim decrypts and opens an encrypted PDF;"


A form control that auto-submits itself, how does that even pass through review in all PDF viewers out there? And how on earth is it possible that auto-submitting a form isn't disabled by default ?

Just overnight, all those PDF viewers have become a liability to every (corporate or no) user on the planet. I hope someone sues their ass off because such an auto-submit behavior was and is irresponsible.

Posted on 08-October-2019 11:16 | Category: News | comment[0] | trackback[0]

 

 

<-- previous page

< July >
0102030405
0607080910
1112131415
1617181920
2122232425
2627282930
31



 

 

This site
Home
Articles

DevTools
CPU-Z
EditPlus
ExplorerXP
Kill.exe
OllyDbg
DependencyWalker
Process Explorer
autoruns.exe
Araxis
COM Trace injection
CodeStats
NetBrute
FileMon/Regmon
BoundsChecker
AQTime profiler
Source monitor
GDI leaks tracking
Rootkit revealer
Rootkit removal
RunAsLimitedUser(1)
RunAsLimitedUser(2)

 

 

Liens
Le Plan B
Un jour à Paris
Meneame
Rezo.net (aggr)
Reseau voltaire
Cuba solidarity project
Le grand soir
L'autre journal
Le courrier suisse
L'Orient, le jour
Agoravox (aggr)