In addition, Stevens last week released a proof-of-concept demonstrating how PDF files could be exploited with minimal user interaction -- just saving it to the hard drive and viewing it in Windows Explorer.
But this latest attack vector is more risky, he says, because the user doesn't have to do anything with the file at all. "It requires no user interaction, and for the Windows Indexing Service, it can lead to total system compromise [with] privilege escalation," Stevens says.
Windows Indexing Service is an operating system-level feature that provides an index of files on the system.
Adobe plans to release updates to address the vulnerability starting this week: By March 11, it will update Adobe Reader 9 and Acrobat 9, and by March 18, Adobe Reader 7 and 8 and Acrobat 7 and 8.
Stevens' latest attack demonstrates how an infected PDF sitting on a Windows XP SP2 machine -- with Windows Indexing Services and Adobe Acrobat Reader 9 running -- gets "indexed." Then the malware is executed, allowing for a privilege escalation attack. Stevens recommends disabling the indexing services' ability to index PDFs.
Why the seemingly increase in threats to documents like PDFs? It's all about the bad guys looking for new ways to get malware past filters. "Sending executables via e-mail is not as effective as it used to be. Many enterprises, free e-mail providers, and AV products block attached executables. So malware authors are looking for other vectors and are starting to use document formats, like MS Office formats and PDF," Stevens says. "Document attachments are rarely blocked."
Meanwhile, Stevens says since this was just another method of exploiting the Adobe zero-day bug, he didn't report it to Adobe first. "If this would have been a new bug in Acrobat, I would have disclosed this to Adobe and not made it public before a patch was available. But since this is another way to exploit the zero-day that was reported to Adobe in February, I made it public so users and administrators can take appropriate actions," he says.
Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message