[olug] [ot] chrome
Rob Townley
rob.townley at gmail.com
Tue Dec 7 04:34:07 UTC 2010
>From the Nov 7th changelog at http://poppler.freedesktop.org/
* Fix crash in the Cairo backend in documents with invalid type 3 fonts
* Fix crashes in broken documents
So, i could crash okular by sending you a broken document or just a
font you are unlikely to have. Could i fuzz that out and place
something on the stack at the right place to execute something?
If you personally examine all the code in Okular and prepatched the
Poppler bugs above, then you may have been safe. Otherwise, it is a
gamble. i am all for using non standard PDF readers because they
might be safer, but i don't see which specific pdf standards that
Okular supports and it may not support paper sizes at all. Doesn't
look like it supports forms at all.
Just out of curiousity. Anybody have metasploit loaded? At the msf
console, show exploits and filter for poppler or okular or just pdf.
The point being that there are vulnerabilities in almost all plugins
and all browsers on all operating systems. Just look at the
screenshots of a Zeus botnet command and control center. Firefox on
Linux makes up some of the botnet. Was the $800 price increase for
Zeus too much? Icepack, Adpack, NeoSploit, SecretBanker might still
be had for less than a hundred.
Practice defense-in-depth and sandbox. Better yet, use qubes-os.org
and sandbox.
Use a PDF Exploit to jailbreak your iphone:
http://www.tuaw.com/2010/08/03/jailbreakme-site-utilizes-pdf-exploit-in-ios/
Adobe competes against java jvm and that new stuff from the rich guy.
Would have preferred it stay simple, but they want a platform, not
just a reader.
On Mon, Dec 6, 2010 at 8:31 AM, Benjamin Watson <bwatson1979 at gmail.com> wrote:
> I'll have to side with Luke on this one. Sure, the PDF spec has a
> portion to embed javascript and to tell client software what "EXE" to
> execute, but the vulnerabilities arise in the client-side
> implementation of the PDF spec. Adobe has been screwing this up all
> the time with Reader.
>
> On Sun, Dec 5, 2010 at 10:17 PM, Will Langford <unfies at gmail.com> wrote:
>>>
>>> Extra crap? Holes? Protection? Are you seriously talking about PDF?
>>> I'm not aware of any holes, or any need for a sandbox.
>>> What does PDF have to do with Flash anyhow? PDF is an open standard, with
>>> at
>>> least one viewer (Okular) far superior to Adobe's for Linux. It's more or
>>> less
>>> just compression for GhostScript...
>>>
>>>
>> http://www.zdnet.co.uk/news/security-threats/2010/08/04/adobe-confirms-pdf-security-hole-in-reader-40089737/
>>
>> <http://www.zdnet.co.uk/news/security-threats/2010/08/04/adobe-confirms-pdf-security-hole-in-reader-40089737/>Or....
>> to... even get away from crafty things like that... how about something much
>> simpler:
>>
>> http://www.h-online.com/security/news/item/PDF-exploit-requires-no-specific-security-hole-to-function-968140.html
>>
>> ------------------
>>
>> PDF hasn't been 'just a text formatter' for a very long time....
>>
>> -Will
>> _______________________________________________
>> OLUG mailing list
>> OLUG at olug.org
>> https://lists.olug.org/mailman/listinfo/olug
>>
> _______________________________________________
> OLUG mailing list
> OLUG at olug.org
> https://lists.olug.org/mailman/listinfo/olug
>
More information about the OLUG
mailing list