Home > slashdot > Foxit One-Ups Adobe In Blocking PDF Attack Tactics

Foxit One-Ups Adobe In Blocking PDF Attack Tactics

May 4th, 2010 05:38 admin Leave a comment Go to comments

CWmike writes “Foxit Software, the developer of a rival PDF viewer to Adobe’s vulnerability-plagued Reader, released an update on Tuesday that blocks some attacks with a ‘safe mode’ that’s switched on by default. Foxit Reader 3.3 for Windows’ ‘Trust Manager’ blocks all external commands that may be tucked into a PDF document. ‘The Foxit Reader 3.3 enables users to allow or deny unauthorized actions and data transmission, including URL connection, attachment PDF actions, and JavaScript functions,’ the update’s accompanying text explains. Last week, several security companies warned of a major malware campaign that tried to dupe users into opening rigged PDFs that exploited an unpatched design flaw in the PDF format, one attackers could use to infect users of Adobe’s and Foxit’s software. That flaw in the PDF specification’s ‘/Launch’ function was disclosed in late March by Belgium security researcher Didier Stevens, who demonstrated how he could abuse the feature to run malware embedded in a PDF document. He also reported he had figured out how to change Adobe Reader’s warning to enhance the scam.”

Source: Foxit One-Ups Adobe In Blocking PDF Attack Tactics

Related Articles:

  1. Adobe’s Reader X Spoils New PDF Attack
  2. New Adobe PDF Zero-Day Under Attack
  3. Adobe Warns of Reader, Acrobat Attack
  4. $50,000 Zero-Day Exploit Evades Adobe’s Sandbox, Say Russian Analysts
  5. No JavaScript Needed For New Adobe Exploits
blog comments powered by Disqus