1581, 7/80 ȸ¿ø°¡ÀÔ  ·Î±×ÀΠ 
   err0r2
   http://javaphile.org
   ÇãÁ¢ÇÑ °¨È¸ - VI

http://www.hackerschool.org/HS_Boards/zboard.php?id=Free_Lectures&no=1199 [º¹»ç]


¿À´ÃÀº ±×³É ´Ì~¿ì~½º Çϳª¸¸ ±×³É ÆÛ¿À±â·Î Çß´Ù.

Ãâó:

  http://www.shadowserver.org/wiki/pmwiki.php?n=Calendar.20090219


When PDFs Attack - Acrobat [Reader] 0-Day On the Loose

The Shadowserver Foundation has recently become aware of a very severe vulnerability in Adobe Acrobat affecting versions 8.x and 9 that is currently on the loose in the wild and being actively exploited. We are aware of several different variations of this attack, however, we were provided with a sample last week in which we were permitted to analyze and detail in this post. We want to make it clear that we did not discover this vulnerability and are only posting this information to make sure others are aware and can adequately protect themselves. All of our testing was done on Adobe Acrobat Reader 8.1.0, 8.1.1, 8.1.2, 8.1.3 (latest release of 8), and 9.0.0 (latest release of 9). We have not confirmed via testing that the exploit actually works on Adobe Acrobat (non-Reader) but believe that it will also affect it as well.

Right now we believe these files are only being used in a smaller set of targeted attacks. However, these types of attacks are frequently the most damaging and it is only a matter of time before this exploit ends up in every exploit pack on the Internet. As a result we are also not going to provide any specific details on how the exploit works despite the fact that information is known. We know several of the details on the internals thanks to a good friend of mine -- Matt Richard. He took a look at the file for us last week and provided the following:

The malicious PDF's in the wild exploit a vulnerability in a non-JavaScript function call. However, they do use some JavaScript to implement a heap spray for successful code execution. The malicious PDF's in the wild contain JavaScript that is used to fill the heap with shellcode. Since this exploit relies on both JavaScript and non-JavaScript components there are some potential reliability issues which has led to confusion over which platforms are affected.

Testing of the exploit with XP SP3 using Adobe Reader 8.1.1, 8.1.2, 8.1.3 and 9.0.0 shows that the vulnerability results in code execution on all of them. There may be cases where Adobe Reader crashes without code execution, especially on systems with more physical memory and faster processors. This is likely due to the race condition needed to populate the heap before certain data structures are parsed by Reader.

The exploit can be effectively mitigated by disabling JavaScript. In this scenario Adobe will still crash but the required heap spray will not occur and code execution is not possible. There may be a method for populating the heap with the necessary shellcode without JavaScript, however if such a technique exists I am not aware of it. As a general rule I like the idea of both disabling JavaScript in Adobe Reader and also flagging PDF documents containing JavaScript at perimeter devices.

In Matt and I's testing, we found that disabling JavaScript would definitely prevent the malware from being installed on the system. However, it would still result in the crash of the application. We would HIGHLY recommend that you DISABLE JAVASCRIPT in your Adobe Acrobat [Reader] products. You have the choice of small loss in functionality and a crash versus your systems being compromised and all your data being stolen. It should be an easy choice.

Disabling JavaScript is easy. This is how it can be done in Acrobat Reader:

Click: Edit -> Preferences -> JavaScript and uncheck Enable Acrobat JavaScript

We believe Adobe is aware of this issue and actively working to address it. However, we felt it was necessary to release this information to let people know how to mitigate against the attacks as they can be devastating. Right now multiple Antivirus companies detect this threat. We will update this post as we have more information that we can share on this.

A special thanks to the kind source that provided the file to us last week for analysis.

---

It has been pointed out to us that Symantec may have been protecting against this since February 12, 2009. We have not had it confirmed but believe they detect it as Trojan.Pidief.E which has a write-up here.
We have also been informed Trend Micro currently detects this threat as "TROJ_PIDIEF.IN".

=>Posted February 19, 2009, at 03:03 PM by Steven Adair

¹¹ ±×Àú ±×·¸´Ù´Â°Í...½Ã¸¸ÅÃèØ :Bloodhound.PDF.6

http://www.symantec.com/en/th/enterprise/security_response/writeup.jsp?docid=2009-021215-2608-99

ÇÊ¿äÇÏ½Ã¸é ¿¬¶ôÇϽñæ...

  Hit : 13828     Date : 2009/02/20 02:16



    
1461   ¡éº¸Ãæ. ¿Ã¹Ù¸¥ °Ë»ö Á¶°ÇÀ¸·Î, find¸í·É¾î¸¦ »ç¿ëÇÏÀÚ.[13]     yl
09/09 13858
  ÇãÁ¢ÇÑ °¨È¸ - VI     err0r2
02/20 13827
1459   [ÀÚÀÛ]¹«Â÷º° ´ëÀÔ°ø°Ý(brute force attack)°­Á 1     h@cking2013
01/24 13782
1458   [ÀÚÀÛ]¹éÆ®·¢ 4 R1, À©7 ¸ÖƼºÎÆà (+ ÇѱÛÈ­+grub¼³Á¤)[4]     williamlee
11/20 13750
1457   [°­Ãß] ÇØÅ· °ü·Ã ¿©·¯°¡Áö »çÀÌÆ®[5]     6Moderato
09/04 13713
1456   [ÀÚÀÛ] °øÀ¯±â¾²´Â Áý¿¡¼­ ¼­¹öµ¹¸®±â / dmz¼³Á¤[4]     ÇÁ¶óÀ̵å
08/11 13662
1455   ½ÅÇü Áß±¹¹ß ³×ÀÌÆ®¿Â ÇØÅ· ºÐ¼®[12]     Ǫ¸¥ÇÏ´Ã
02/12 13643
1454   À©µµ¿ì ½Ã½ºÅÛÀÇ ÄÄÇ»ÅÍ¿¡¼­ ¸®´ª½º ¼³Ä¡¹æ¹ý[15]     o-0_o-0
09/19 13606
1453   C¾ð¾î¿¡¼­ »ç¿ëµÇ´Â Ư¼ö¹®ÀÚ/¼­½Ä¹®ÀÚ[5]     xodnr631
08/18 13514
1452   * ÇØÅ·ÀÇ °ø°Ý±â¼ú *[3]     HackerMapia
03/01 13514
1451   ¸®´ª½º¿¡¼­ ½ºÅ¸Å©·¡ÇÁÆ®¸¦ ÇÑ´Ù?[9]     jonginsir
02/08 13469
1450   °­ÁÂÇϳª. µð·ºÅ丮 ³ëÃâ Ãë¾àÁ¡À» ÀÌ¿ëÇÑ ÇØÅ·[5]     whqkdnf000
09/05 13465
1449   ¹éÆ®·¢ÀÇÁ¤¼® Á¦2-1°­[5]     ÀÎõÇØÄ¿
01/21 13457
1448   (2Â÷¼öÁ¤)´Ü¼øÇÏ°í À§ÇèÇÑ ÆÄÀÏ ¾÷·Îµå ÇØÅ·±â¼ú[2]     gohy032
07/30 13445
1447   OSI 7°èÃþ°ú TCP/IP°èÃþ      gnsehfvlr
05/06 13440
1446   ¾î¼Àºí¸®¾î °­Á 1Æí[1]     asdzxc301
12/13 13408
1445   ÇØÅ·¹æ¹ý[12]     bongcheur
07/07 13347
1444   [ÀÚÀÛ]RedHat 6.2 ȯ°æ¿¡¼­ BOF exploit ¸¸µé±â[6]     buff3r
03/17 13342
1443   [ÀÚÀÛÈĸµÅ©]KSSN ´Ù½Ã ¾¹´Ï´Ù (Á¦´ë·Î)[1]     ÃÊÄÝ·¿³ªÀÎ
03/07 13334
1442   ÀÓº£µðµå ¸®´ª½º °øºÎ¹æ¹ý[6]     hansu9
08/22 13312
[1][2][3][4][5][6] 7 [8][9][10]..[80]

Copyright 1999-2024 Zeroboard / skin by Hackerschool.org / Secure Patch by Hackerschool.org