No User Action Required In Newly Discovered PDF AttackMarch 10, 2009 – 4:43 AM
Merely storing — without opening — a malicious PDF file can trigger an attack that exploits the new, unpatched zero-day flaw in Adobe Reader, a researcher has discovered. Didier Stevens, a researcher and IT security consultant with Contrast Europe NV, today released a proof-of-concept demonstration that shows how a file infected with the Adobe flaw can trigger a new attack when the machine uses Windows Indexing Services. And the user doesn’t even have to open or select the document.
In addition, Stevens last week released a proof-of-concept demonstrating how PDF files could be exploited with minimal user interaction — just saving it to the hard drive and viewing it in Windows Explorer.
But this latest attack vector is more risky, he says, because the user doesn’t have to do anything with the file at all. “It requires no user interaction, and for the Windows Indexing Service, it can lead to total system compromise [with] privilege escalation,” Stevens says.
Windows Indexing Service is an operating system-level feature that provides an index of files on the system.