Slideshow: Cloud Security Pros And Cons
|(click for larger image and for full photo gallery)|
The zero-day bug has been confirmed in all versions of 8 and 9 Acrobat and Reader releases for Windows, Macintosh, and Unix, including the latest versions, 8.2.4 and 9.3.4. A successful attack will exploit a user's system.
According to an advisory published by security information service Secunia, "the vulnerability is caused due to a boundary error within the font parsing in CoolType.dll and can be exploited to cause a stack-based buffer overflow."
The vulnerability employs a PDF file with built-in malicious code, which arrives as an e-mail attachment. Executing the PDF kicks off a variety of activities, including dropping an executable file into a temporary directory and attempting to run it. The dropped file, in a move reminiscent of Stuxnet, also carries a valid digital signature, in this case from Vantage Credit Union in St. Louis, said security researcher Roel Schouwenberg at Kaspersky Lab.
"The exploit is pretty basic," he said, but interestingly it employs return-oriented programming (ROP) to bypass some vulnerability mitigation techniques built into Windows Vista and 7. "More widespread usage of ROP for exploits is something I've been expecting for a while," he said, thanks to the increasing consumer and corporate adoption of both.