Re: Vulnerability (critical): Digital signature for Adobe Acrobat/Reader plug-in can be forged

From: Dan Harkless (bugtraqat_private)
Date: Wed Mar 26 2003 - 10:35:13 PST

  • Next message: CORE Security Technologies Advisories: "[VulnWatch] CORE-2003-0306: RealPlayer PNG deflate heap corruption vulnerability"

    Vladimir Katalov <infoat_private> writes:
    >   We were able to write a 'fake' plug-in "fakecert.api" which does
    >   nothing, but being loaded by Adobe Acrobat (and Reader) 4 and 5
    >   as the certified one even in 'trusted' mode, though we don't have
    >   a 'Reader Integration Key' (this plug-in has been provided only to
    >   Adobe and CERT). When installed into 'plug_ins' subfolder, plug-in
    >   is being loaded every time when Adobe Acrobat (or Reader) starts, and
    >   shows a simple message box.
    
    For those of us not familiar with Acrobat plugins, is there some facility
    for the program retrieving/installing plugins automatically, or, to exploit
    this would you need to entice a user to manually place your .api file in
    their "plug_ins" directory (or run an installer program that would do so, in
    which case you could run arbitrary code anyway in the installer)?
    
    --
    Dan Harkless
    bugtraqat_private
    http://harkless.org/dan/
    



    This archive was generated by hypermail 2b30 : Thu Mar 27 2003 - 17:35:33 PST