Secunia CSI7
Advisories
Research
Forums
Create Profile
Our Commitment
PSI
PSI API
CSI
OSI
xSI
Vulnerabilities
Programs
Open Discussions
My Threads
Create Thread
Statistics
About

Forum Thread: Adobe Reader and Skype alerts

You are currently viewing a forum thread in the Secunia Community Forum. Please note that opinions expressed here are not of Secunia but solely reflect those of the user who wrote it.

This thread was submitted in the following forum:
Open Discussions

This thread has been marked as locked.
mogs Adobe Reader and Skype alerts
Expert Contributor 29th Apr, 2013 12:42
Ranking: 2265
Posts: 6,266
User Since: 22nd Apr, 2009
System Score: 100%
Location: UK
Last edited on 29th Apr, 2013 12:43

1
Experts Identify PDF Usage Tracking Issue in Adobe Reader


Experts warn of PDF usage tracking issue

Researchers from security firm McAfee have identified an interesting issue that affects all versions of Adobe Reader. While the flaw can’t be leveraged to execute code, it can be successfully utilized to track when and where specially-crafted PDF documents are opened.

“When a specific PDF JavaScript API is called with the first parameter having a UNC-located resource, Adobe Reader will access that UNC resource. However, this action is normally blocked and creates a warning dialog asking for permission,” McAfee’s Haifei Li explained in a blog post.

“The danger is that if the second parameter is provided with a special value, it changes the API’s behavior. In this situation, if the UNC resource exists, we see the warning dialog. However, if the UNC resource does not exist, the warning dialog will not appear even though the TCP traffic has already gone.”

The company has identified PDFs that leverage this bug. They have been sent by an “email tracking service” provider.

For the time being, it’s uncertain if the method has been used for illegal purposes, but experts warn that it could be.

Li explains that it could be successfully applied in advanced persistent threat (APT) attacks, which usually have several phases.

This particular PDF flaw could be leveraged in the first step of the attack, the one that involves collecting as much information as possible from the victim.

“Malicious senders could exploit this vulnerability to collect sensitive information such as IP address, Internet service provider, or even the victim’s computing routine. In addition, our analysis suggests that more information could be collected by calling various PDF JavaScript APIs,” Li noted.

Adobe has been notified of the issue, but so far, there’s no patch. In the meantime, users are advised to consider disabling JavaScript in Reader.

http://news.softpedia.com/news/Experts-Identify-PD...

2
Alert: Skype account hijack technique may affect all users

Summary: After six malicious takeovers of his Skype account, a frustrated security researcher has posted his attempts to get Skype's help. Here's how to protect yourself.
By Violet Blue for Zero Day | April 27, 2013 -- 09:40 GMT (10:40 BST)

According to security researcher @TibitXimer (A.K.A. Dylan) his Skype account was stolen six times, and now claims all Skype user accounts are vulnerable to the same fate due to Skype's flimsy account recovery practices - which are especially thin, as he discovered the hard way, when contacting customer service.

When he contacted Skype support, reps didn't appear to acknowledge that the issue was immediate... and repeating.

Perhaps that is because his account had been hijacked through basic social engineering techniques and not hacked - as then he learned that the problem was with contacting customer service itself.

Read more at :-
http://www.zdnet.com/alert-skype-account-hijack-te...

--

No one has replied to this thread yet - be the first
This thread has been marked as locked.


 Products Solutions Customers Partner Resources Company
 
 Corporate
Vulnerability Intelligence Manager (VIM)
Corporate Software Inspector (CSI)
Consumer
Personal Software Inspector (PSI)
Online Software Inspector (OSI)
 Industry
Compliance
Technology
Integration
 Customers
Testimonials
 VARS
MSSP
Technology Partners
References
 Reports
Webinars
Events
 About us
Careers
Memberships
Newsroom


 
© 2002-2014 Secunia ApS - Rued Langgaards Vej 8, 4th floor, DK-2300 Copenhagen, Denmark - +45 7020 5144
Terms & Conditions and Copyright - Privacy - Report Vulnerability - Disclaimer