{"id":1508,"date":"2010-04-10T09:09:52","date_gmt":"2010-04-10T08:09:52","guid":{"rendered":"http:\/\/blog.intego.com\/?p=1508"},"modified":"2010-04-10T09:09:52","modified_gmt":"2010-04-10T08:09:52","slug":"pdf-flaw-inherent-in-adobe-acrobat-and-reader-could-lead-to-many-attacks","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/pdf-flaw-inherent-in-adobe-acrobat-and-reader-could-lead-to-many-attacks\/","title":{"rendered":"PDF Flaw, Inherent in Adobe Acrobat and Reader, Could Lead to Many Attacks"},"content":{"rendered":"<p>Computerworld is <a href=\"http:\/\/www.computerworld.com\/s\/article\/9175159\/Researcher_warns_of_impending_PDF_attack_wave\">reporting on a new problem with Adobe Acrobat and Reader software.<\/a> Initially presented about ten days ago by security researcher Didier Stevens <a href=\"http:\/\/blog.didierstevens.com\/2010\/03\/29\/escape-from-pdf\/\">on his blog<\/a>, this attack uses no underhanded tricks to perform its nefarious action. It simply uses a &#8220;feature&#8221; of Adobe&#8217;s PDF reader software that allows PDFs to contain instructions to open applications and execute code. Getting people to open the PDFs in question is one of social engineering, because they lead to a message being displayed by the software. However, the hacker creating the PDF can create the wording of this message, leading to the possibility that people will be tricked.<\/p>\n<p>Adobe is as reticent about turning this off as they are about Javascript, another vector of attack. While there is a preference that can be turned off to protect from this &#8220;feature&#8221; &#8211; in Trust Manager preferences, uncheck &#8220;Allow opening of non-PDF file attachments with external applications&#8221; &#8211; most users won&#8217;t make this change, or even know about it.<\/p>\n<p>Well, you know about it, so go change the preferences in your Adobe PDF software. Or, just use the easy solution: Apple&#8217;s Preview instead of Adobe Acrobat or Reader.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Computerworld is reporting on a new problem with Adobe Acrobat and Reader software. Initially presented about ten days ago by security researcher Didier Stevens on his blog, this attack uses no underhanded tricks to perform its nefarious action. It simply uses a &#8220;feature&#8221; of Adobe&#8217;s PDF reader software that allows PDFs to contain instructions to [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":1673,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13,11],"tags":[15,99,144],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Computerworld is reporting on a new problem with Adobe Acrobat and Reader software. Initially presented about ten days ago by security researcher Didier\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/pdf-flaw-inherent-in-adobe-acrobat-and-reader-could-lead-to-many-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"PDF Flaw, Inherent in Adobe Acrobat and Reader, Could Lead to Many Attacks  - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Computerworld is reporting on a new problem with Adobe Acrobat and Reader software. Initially presented about ten days ago by security researcher Didier\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/pdf-flaw-inherent-in-adobe-acrobat-and-reader-could-lead-to-many-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2010-04-10T08:09:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/04\/acrobat.png\" \/>\n\t<meta property=\"og:image:width\" content=\"128\" \/>\n\t<meta property=\"og:image:height\" content=\"128\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Peter James\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/pdf-flaw-inherent-in-adobe-acrobat-and-reader-could-lead-to-many-attacks\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/04\/acrobat.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/04\/acrobat.png\",\"width\":\"128\",\"height\":\"128\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/pdf-flaw-inherent-in-adobe-acrobat-and-reader-could-lead-to-many-attacks\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/pdf-flaw-inherent-in-adobe-acrobat-and-reader-could-lead-to-many-attacks\/\",\"name\":\"PDF Flaw, Inherent in Adobe Acrobat and Reader, Could Lead to Many Attacks - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/pdf-flaw-inherent-in-adobe-acrobat-and-reader-could-lead-to-many-attacks\/#primaryimage\"},\"datePublished\":\"2010-04-10T08:09:52+00:00\",\"dateModified\":\"2010-04-10T08:09:52+00:00\",\"description\":\"Computerworld is reporting on a new problem with Adobe Acrobat and Reader software. Initially presented about ten days ago by security researcher Didier\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/pdf-flaw-inherent-in-adobe-acrobat-and-reader-could-lead-to-many-attacks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/pdf-flaw-inherent-in-adobe-acrobat-and-reader-could-lead-to-many-attacks\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/pdf-flaw-inherent-in-adobe-acrobat-and-reader-could-lead-to-many-attacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"PDF Flaw, Inherent in Adobe Acrobat and Reader, Could Lead to Many Attacks\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/pdf-flaw-inherent-in-adobe-acrobat-and-reader-could-lead-to-many-attacks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/pdf-flaw-inherent-in-adobe-acrobat-and-reader-could-lead-to-many-attacks\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\"},\"headline\":\"PDF Flaw, Inherent in Adobe Acrobat and Reader, Could Lead to Many Attacks\",\"datePublished\":\"2010-04-10T08:09:52+00:00\",\"dateModified\":\"2010-04-10T08:09:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/pdf-flaw-inherent-in-adobe-acrobat-and-reader-could-lead-to-many-attacks\/#webpage\"},\"wordCount\":207,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/pdf-flaw-inherent-in-adobe-acrobat-and-reader-could-lead-to-many-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/04\/acrobat.png\",\"keywords\":[\"Adobe\",\"PDF\",\"Vulnerability\"],\"articleSection\":[\"Security &amp; Privacy\",\"Software &amp; Apps\"],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\",\"name\":\"Peter James\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"caption\":\"Peter James\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Computerworld is reporting on a new problem with Adobe Acrobat and Reader software. Initially presented about ten days ago by security researcher Didier","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/pdf-flaw-inherent-in-adobe-acrobat-and-reader-could-lead-to-many-attacks\/","og_locale":"en_US","og_type":"article","og_title":"PDF Flaw, Inherent in Adobe Acrobat and Reader, Could Lead to Many Attacks  - The Mac Security Blog","og_description":"Computerworld is reporting on a new problem with Adobe Acrobat and Reader software. Initially presented about ten days ago by security researcher Didier","og_url":"https:\/\/www.intego.com\/mac-security-blog\/pdf-flaw-inherent-in-adobe-acrobat-and-reader-could-lead-to-many-attacks\/","og_site_name":"The Mac Security Blog","article_published_time":"2010-04-10T08:09:52+00:00","og_image":[{"width":"128","height":"128","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/04\/acrobat.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Peter James","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/pdf-flaw-inherent-in-adobe-acrobat-and-reader-could-lead-to-many-attacks\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/04\/acrobat.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/04\/acrobat.png","width":"128","height":"128"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/pdf-flaw-inherent-in-adobe-acrobat-and-reader-could-lead-to-many-attacks\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/pdf-flaw-inherent-in-adobe-acrobat-and-reader-could-lead-to-many-attacks\/","name":"PDF Flaw, Inherent in Adobe Acrobat and Reader, Could Lead to Many Attacks - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/pdf-flaw-inherent-in-adobe-acrobat-and-reader-could-lead-to-many-attacks\/#primaryimage"},"datePublished":"2010-04-10T08:09:52+00:00","dateModified":"2010-04-10T08:09:52+00:00","description":"Computerworld is reporting on a new problem with Adobe Acrobat and Reader software. Initially presented about ten days ago by security researcher Didier","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/pdf-flaw-inherent-in-adobe-acrobat-and-reader-could-lead-to-many-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/pdf-flaw-inherent-in-adobe-acrobat-and-reader-could-lead-to-many-attacks\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/pdf-flaw-inherent-in-adobe-acrobat-and-reader-could-lead-to-many-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"PDF Flaw, Inherent in Adobe Acrobat and Reader, Could Lead to Many Attacks"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/pdf-flaw-inherent-in-adobe-acrobat-and-reader-could-lead-to-many-attacks\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/pdf-flaw-inherent-in-adobe-acrobat-and-reader-could-lead-to-many-attacks\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116"},"headline":"PDF Flaw, Inherent in Adobe Acrobat and Reader, Could Lead to Many Attacks","datePublished":"2010-04-10T08:09:52+00:00","dateModified":"2010-04-10T08:09:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/pdf-flaw-inherent-in-adobe-acrobat-and-reader-could-lead-to-many-attacks\/#webpage"},"wordCount":207,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/pdf-flaw-inherent-in-adobe-acrobat-and-reader-could-lead-to-many-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/04\/acrobat.png","keywords":["Adobe","PDF","Vulnerability"],"articleSection":["Security &amp; Privacy","Software &amp; Apps"],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116","name":"Peter James","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","caption":"Peter James"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/04\/acrobat.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-ok","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/1508"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=1508"}],"version-history":[{"count":0,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/1508\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/1673"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=1508"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=1508"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=1508"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}