Warning: Use of undefined constant add_shortcode - assumed 'add_shortcode' (this will throw an Error in a future version of PHP) in /nfs/c03/h02/mnt/49321/domains/hackingtheuniverse.com/html/wp-content/plugins/stray-quotes/stray_quotes.php on line 615

Warning: Use of undefined constant MSW_WPFM_FILE - assumed 'MSW_WPFM_FILE' (this will throw an Error in a future version of PHP) in /nfs/c03/h02/mnt/49321/domains/hackingtheuniverse.com/html/wp-content/plugins/wordpress-file-monitor/wordpress-file-monitor.php on line 39
Clickless PDF Vulnerability

Clickless PDF Vulnerability

The following link includes a video that demonstrates how it is possible to launch exploit code with the new PDF vulnerability simply by selecting the file icon, switching to thumbnail view, or just hovering over the file icon. Each of these actions triggers a Windows Explorer shell extension which reads information from the PDF file, and this enables the exploit code to run.

JBIG2Decode Trigger Trio – [blog.didierstevens.com]

More on the vulnerability:
JBIG2Decode Essentials – [blog.didierstevens.com]

Adobe PDF Exploit Code Analysis – [securitylabs.websense.com]

Vulnerability Summary for CVE-2009-0658 – [web.nvd.nist.gov]

Adobe Acrobat and Reader JBIG2 image stream buffer overflow – [xforce.iss.net]

Leave a Reply

You must be logged in to post a comment.