{"id":2272,"date":"2011-01-04T11:19:18","date_gmt":"2011-01-04T10:19:18","guid":{"rendered":"http:\/\/blog.intego.com\/?p=2272"},"modified":"2011-01-04T11:19:18","modified_gmt":"2011-01-04T10:19:18","slug":"pdfs-are-more-dangerous-than-previously-thought","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/pdfs-are-more-dangerous-than-previously-thought\/","title":{"rendered":"PDFs Are More Dangerous than Previously Thought"},"content":{"rendered":"<p>In a recent presentation to the <a href=\"http:\/\/events.ccc.de\/congress\/2010\/wiki\/Main_Page\">Chaos Communication Congress<\/a> in Berlin, security researcher Julia Wolf highlighted a number of &#8220;features&#8221; of the PDF format that could lead to serious security issues. Wolf showed that a PDF could contain a database scanner that could &#8220;scan a network when the document is printed on a network printer,&#8221; and that PDFs could &#8220;blindly trigger the execution of arbitrary programs in Acrobat Reader.&#8221; PDFs also support &#8220;inherently insecure script languages such as JavaScript, formats such as XML, RFID tags and digital rights management (DRM) technologies.&#8221;<\/p>\n<p>In addition, PDFs are such that data can be hidden in many places within files. Document and metadata can be read and modified using Javascript, and compressed files, such as ZIP files, could be incorporated inside PDFs. In short, the PDF format, designed to retain layout across platforms, has been turned into a kitchen-sink format that does far too much, and this overloading of features leads to potential security issues.<\/p>\n<p>Adobe plans to use sandboxing in the next version of its Reader and Acrobat software, but it&#8217;s not clear whether this will be enough to mitigate some of the possible exploits that can be used in PDFs. <\/p>\n<p>So, once again, we strongly recommend that Mac users use Preview to view PDFs, unless they absolutely need features present in Adobe&#8217;s software.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In a recent presentation to the Chaos Communication Congress in Berlin, security researcher Julia Wolf highlighted a number of &#8220;features&#8221; of the PDF format that could lead to serious security issues. Wolf showed that a PDF could contain a database scanner that could &#8220;scan a network when the document is printed on a network printer,&#8221; [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":2273,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13,11],"tags":[15,99],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"In a recent presentation to the Chaos Communication Congress in Berlin, security researcher Julia Wolf highlighted a number of &quot;features&quot; of the PDF\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/pdfs-are-more-dangerous-than-previously-thought\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"PDFs Are More Dangerous than Previously Thought  - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"In a recent presentation to the Chaos Communication Congress in Berlin, security researcher Julia Wolf highlighted a number of &quot;features&quot; of the PDF\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/pdfs-are-more-dangerous-than-previously-thought\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2011-01-04T10:19:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2011\/01\/pdf.png\" \/>\n\t<meta property=\"og:image:width\" content=\"128\" \/>\n\t<meta property=\"og:image:height\" content=\"131\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Peter James\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/pdfs-are-more-dangerous-than-previously-thought\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2011\/01\/pdf.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2011\/01\/pdf.png\",\"width\":\"128\",\"height\":\"131\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/pdfs-are-more-dangerous-than-previously-thought\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/pdfs-are-more-dangerous-than-previously-thought\/\",\"name\":\"PDFs Are More Dangerous than Previously Thought - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/pdfs-are-more-dangerous-than-previously-thought\/#primaryimage\"},\"datePublished\":\"2011-01-04T10:19:18+00:00\",\"dateModified\":\"2011-01-04T10:19:18+00:00\",\"description\":\"In a recent presentation to the Chaos Communication Congress in Berlin, security researcher Julia Wolf highlighted a number of \\\"features\\\" of the PDF\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/pdfs-are-more-dangerous-than-previously-thought\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/pdfs-are-more-dangerous-than-previously-thought\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/pdfs-are-more-dangerous-than-previously-thought\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"PDFs Are More Dangerous than Previously Thought\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/pdfs-are-more-dangerous-than-previously-thought\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/pdfs-are-more-dangerous-than-previously-thought\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\"},\"headline\":\"PDFs Are More Dangerous than Previously Thought\",\"datePublished\":\"2011-01-04T10:19:18+00:00\",\"dateModified\":\"2011-01-04T10:19:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/pdfs-are-more-dangerous-than-previously-thought\/#webpage\"},\"wordCount\":228,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/pdfs-are-more-dangerous-than-previously-thought\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2011\/01\/pdf.png\",\"keywords\":[\"Adobe\",\"PDF\"],\"articleSection\":[\"Security &amp; Privacy\",\"Software &amp; Apps\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/pdfs-are-more-dangerous-than-previously-thought\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\",\"name\":\"Peter James\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"caption\":\"Peter James\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"In a recent presentation to the Chaos Communication Congress in Berlin, security researcher Julia Wolf highlighted a number of \"features\" of the PDF","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/pdfs-are-more-dangerous-than-previously-thought\/","og_locale":"en_US","og_type":"article","og_title":"PDFs Are More Dangerous than Previously Thought  - The Mac Security Blog","og_description":"In a recent presentation to the Chaos Communication Congress in Berlin, security researcher Julia Wolf highlighted a number of \"features\" of the PDF","og_url":"https:\/\/www.intego.com\/mac-security-blog\/pdfs-are-more-dangerous-than-previously-thought\/","og_site_name":"The Mac Security Blog","article_published_time":"2011-01-04T10:19:18+00:00","og_image":[{"width":"128","height":"131","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2011\/01\/pdf.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Peter James","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/pdfs-are-more-dangerous-than-previously-thought\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2011\/01\/pdf.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2011\/01\/pdf.png","width":"128","height":"131"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/pdfs-are-more-dangerous-than-previously-thought\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/pdfs-are-more-dangerous-than-previously-thought\/","name":"PDFs Are More Dangerous than Previously Thought - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/pdfs-are-more-dangerous-than-previously-thought\/#primaryimage"},"datePublished":"2011-01-04T10:19:18+00:00","dateModified":"2011-01-04T10:19:18+00:00","description":"In a recent presentation to the Chaos Communication Congress in Berlin, security researcher Julia Wolf highlighted a number of \"features\" of the PDF","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/pdfs-are-more-dangerous-than-previously-thought\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/pdfs-are-more-dangerous-than-previously-thought\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/pdfs-are-more-dangerous-than-previously-thought\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"PDFs Are More Dangerous than Previously Thought"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/pdfs-are-more-dangerous-than-previously-thought\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/pdfs-are-more-dangerous-than-previously-thought\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116"},"headline":"PDFs Are More Dangerous than Previously Thought","datePublished":"2011-01-04T10:19:18+00:00","dateModified":"2011-01-04T10:19:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/pdfs-are-more-dangerous-than-previously-thought\/#webpage"},"wordCount":228,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/pdfs-are-more-dangerous-than-previously-thought\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2011\/01\/pdf.png","keywords":["Adobe","PDF"],"articleSection":["Security &amp; Privacy","Software &amp; Apps"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/pdfs-are-more-dangerous-than-previously-thought\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116","name":"Peter James","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","caption":"Peter James"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2011\/01\/pdf.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-AE","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/2272"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=2272"}],"version-history":[{"count":0,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/2272\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/2273"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=2272"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=2272"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=2272"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}