Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

11/22/2010
04:30 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Securing The PDF

New Adobe Reader X sandbox and Invincea's virtualized Document Protection offer new methods to combat PDF attacks

The PDF file is getting some major security attention these days: first, Adobe's long-awaited sandboxing feature that rolled out with the new Reader X late last week, and now a tool from a start-up that opens PDFs in a separate virtualized environment.

Poisoned PDFs are one of the most popular vehicles for carrying malicious code, and after beefing up the patching cycle for the heavily targeted application during the past year, Adobe added Protected Mode for the files, which basically places them in a sandbox that separates them from the operating system and other apps so if they are infected, they can't hurt other aspects of the machine.

Invincea's new Document Protection moves Adobe Reader into a virtual environment so that the document can be opened in a quarantined area that also detects, cleans up, and logs forensics information about the malware. The software is offered as a plug-in to Invincea's virtual browser environment, which provides a separate space for browsing so that Web-borne malware threats are kept separate from the system itself.

Anup Ghosh, founder of Invincea, says his firm's tool can be used as another layer of PDF protection along with Reader X's sandbox. Adobe's Protected Mode sandbox helps protect against exploits against Reader that occur in the rendering engine of the app, where most of today's exploits occur, Ghosh says. "JavaScripts run and happen there. [But] a number of components not within that rendering engine are not covered by the [Adobe] sandbox," he says. "In reality, there's a lot of code in Adobe that's outside the rendering engine" and ripe for targeting, he says.

A recent zero-day exploit released earlier this month against Reader was an exploit that targeted a plug-in to the app, he says. "It was not in the rendering engine, so it appears to me that Reader X would not have protected against that type of exploit," Invincea's Ghosh says. Protected Mode can't stop an attacker from using Reader to attack other parts of the host, or other machines on the network, for instance, according to Invincea.

Even so, security experts say Adobe's Protected Mode is a significant step by Adobe in locking down the beleaguered PDF.

Brad Arkin, senior director of product security and privacy, says sandboxing handles most of the real-world attacks against PDFs. "Real-world attacks today are almost always some variant of a memory trespass vulnerability," Arkin said in an interview in July, when Adobe first announced sandboxing. Sandboxing, which restricts what an attacker is able to do with a PDF file, should eliminate many of those types of threats, he says.

The first release of Protected Mode keeps all "write" calls inside the sandbox so if a PDF is infected, the malicious code can't spread outside the file to the system or other files. An upcoming version of the feature will prevent attackers from reading information on the victim's machine.

Richard Stiennon, chief research analyst at IT-Harvest, says Invincea's tool is handy for enterprises in that it issues reporting on malware or attempted attacks that can be used for forensics, for example. "It gives you stats on what the PDF is doing, what the command and control [server] is doing, and what exploit is attempting to [load]," Stiennon says. The tool would be overkill for consumers, but that's where Adobe's Protected Mode could come in, he says.

Meanwhile, the Invincea PDF protection plug-in works as the PDF handler for the system, Ghosh notes. "Whenever you open a PDF -- in an email, on your desktop, or in Flash -- we will open that doc in Document Protection for Adobe Reader," he says. "We take over for Adobe. We literally copy the file from wherever you open it into our virtual file system, where it opens it in Adobe there."

The software, which could eventually be sold as a stand-alone package, is bundled with Invincea Browser Protection, and is priced at an extra $15 per desktop, for about $75 per desktop per year (not including volume discounts). So far, the Defense Department and other national security organizations have been the main customers for Invincea with its browser product, but financial services and healthcare also are on the list, according to Invincea. Invincea was originally funded by the Defense Advanced Research Projects Agency (DARPA) to build a prototype virtualized browser, which ultimately led to its Invincea Browser Protection and, now, Document Protection.

Of course, no security control is foolproof. Researchers have been hammering away at virtual environments and are expected to eventually take a shot at Adobe's sandbox, looking for holes.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
How to Better Secure Your Microsoft 365 Environment
Kelly Sheridan, Staff Editor, Dark Reading,  1/25/2021
Attackers Leave Stolen Credentials Searchable on Google
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-4682
PUBLISHED: 2021-01-28
IBM MQ 7.5, 8.0, 9.0, 9.1, 9.2 LTS, and 9.2 CD could allow a remote attacker to execute arbitrary code on the system, caused by an unsafe deserialization of trusted data. An attacker could exploit this vulnerability to execute arbitrary code on the system. IBM X-Force ID: 186509.
CVE-2020-4888
PUBLISHED: 2021-01-28
IBM QRadar SIEM 7.4.0 to 7.4.2 Patch 1 and 7.3.0 to 7.3.3 Patch 7 could allow a remote attacker to execute arbitrary commands on the system, caused by insecure deserialization of user-supplied content by the Java deserialization function. By sending a malicious serialized Java object, an attacker co...
CVE-2020-13569
PUBLISHED: 2021-01-28
A cross-site request forgery vulnerability exists in the GACL functionality of OpenEMR 5.0.2 and development version 6.0.0 (commit babec93f600ff1394f91ccd512bcad85832eb6ce). A specially crafted HTTP request can lead to the execution of arbitrary requests in the context of the victim. An attacker can...
CVE-2021-20620
PUBLISHED: 2021-01-28
Cross-site scripting vulnerability in Aterm WF800HP firmware Ver1.0.9 and earlier allows remote attackers to inject an arbitrary script via unspecified vectors.
CVE-2021-20621
PUBLISHED: 2021-01-28
Cross-site request forgery (CSRF) vulnerability in Aterm WG2600HP firmware Ver1.0.2 and earlier, and Aterm WG2600HP2 firmware Ver1.0.2 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors.