티스토리 뷰
- Link
- https://pdf-insecurity.org/downloads/paper_reports_theses.html#attacks-on-pdf-signatures-certification-attacks-2021
- https://pdf-insecurity.org/download/pdf-certification/exploits.zip
So what is the problem?
We investigate the following question: How dangerous are permitted changes in certified documents?. To answer this question we systematically analyze the allowed modifications in certified documents and reveal two new vulnerabilities abusing flaws in the PDF specification: Evil Annotation Attack (EAA) and Sneaky Signature Attack (SSA). These vulnerabilities allow an attacker to change the visible content of a PDF document by displaying malicious content over the certified content. Nevertheless, the certification remains valid and the application shows no warnings.
How bad is it?
We evaluated 26 PDF applications and were able to break the security of certified documents in 24 of them. Additionally, we analyzed 26 applications to determine whether the permissions for adding annotations and signatures, as defined in the PDF specification, were implemented correctly. We show that for 11 of 26 applications, a permission mismatch exists.
The detailed results of our study can be found in the Evaluation and in our Paper (S&P'21).
Code Injection Attack on Adobe: Only certified documents may execute high privileged JavaScript code in Adobe products. For example, a high-level JavaScript can call an arbitrary URL without user confirmation to deanonymize a user. Our research reveals that such code is also executed if it is added as an allowed incremental update. We are the first to reveal that this behavior allows attackers to directly embed malicious code into a certified document.
02_Contract_cert_p2_SSA_sig-field_added_high_priv_JS_added_manipulated.pdf
0.02MB
01_Contract_cert_p3_EAA_FreeText_AMOUNT_manipulated.pdf
1.34MB
01_Contract_cert_p3_EAA_annot_added_high_priv_JS_added_manipulated.pdf
0.02MB
01_Contract_cert_p2_SSA_v1_sig-field_added_signed_manipulated.pdf
1.40MB
'보안 > 악성코드' 카테고리의 다른 글
Stuxnet 문서 (0) | 2010.10.28 |
---|---|
mscorsvw.exe (0) | 2010.03.03 |
[Borland] MIDAS.Dll (0) | 2010.01.13 |
Hacking Windows File Protection [펌 : bitsum.com] (0) | 2009.10.22 |
Clubfos 다운로드 매니저 - 설치되는 애드웨어 늘었다 (0) | 2009.10.07 |
공지사항
최근에 올라온 글
최근에 달린 댓글
- Total
- Today
- Yesterday
링크
- 지루박멸연구센타
- 열정의 힘을 믿는다
- Le4rN TO Cr4cK
- 디버깅에관한모든것(DebugLab)
- sysinternals
- FoundStone
- hashtab
- 보안-coderant
- 디바이스드라이버 개발자 포럼
- dualpage.muz.ro
- osronline.com - 드라이버 관련 정보 사이트
- NtInternals - NativeAPI Refere…
- pcthreat - spyware 정보 제공
- rootkit.com - 루트킷 관련 정보
- www.ntinternals.net
- WINE CrossRef. - source.winehq…
- tuts4you
- hex-rays
- idapalace
- idefense
- immunityinc
- threatexpert
- hdp.null2root.org
- www.crackstore.com
- crackmes.de
- www.who.is
- www.cracklab.ru
- community.reverse-engineering.…
- video.reverse-engineering.net
- SnD
- 클레이 키위
- reversengineering.wordpress.co…
- www.openrce.org
- www.woodmann.com
- PEID.Plusins.BobSoft
- roxik.com/pictaps/
- regexlib.com
- spyware-browser.com
- www.usboffice.kr
- regulator
- www.txt2re.com
- ietab.mozdev.org
- zesrever.xstone.org
- www.heaventools.com/PE-file-he…
- www.heaventools.com
- www.innomp3.com
- 울지않는벌새
- exetools.com-forum
- exetools.com
- utf8 conv
- robtex - IP trace
- onsamehost - same IP sites
- JpopSuki
- jsunpack.jeek.org
- wepawet.iseclab.org
- www.jswiff.com
- www.hackeroo.com
- winesearcher.co.kr
- khpga.org
- malwareurl.com
- anubis.iseclab.org
- www.crummy.com-eautifulSoup
- malwarebytes.org/forums
- bbs.janmeng.com
- blackip.ustc.edu.cn
- eureka.cyber-ta.org
- exploit-db.com
TAG
- ROA
- Pivot
- 자동트래이딩
- SBI저축은행
- CriticalSection
- 사회간접자본
- logrotate
- ChatGPT
- ubuntu
- 미국주식
- 피봇
- 주식트래이딩
- systemd
- 레고랜드
- 맥쿼리인프라
- 공공인프라
- O365
- 주택구매력지수
- 전세매매지수
- hai
- 시스템트래이딩
- INVOICE
- 실시간트래이딩
- PIR
- 군함도
- 주식
- ElasticSearch
- 매매가격지수
- 신한저축은행
- 다올저축은행
일 | 월 | 화 | 수 | 목 | 금 | 토 |
---|---|---|---|---|---|---|
1 | ||||||
2 | 3 | 4 | 5 | 6 | 7 | 8 |
9 | 10 | 11 | 12 | 13 | 14 | 15 |
16 | 17 | 18 | 19 | 20 | 21 | 22 |
23 | 24 | 25 | 26 | 27 | 28 |
글 보관함