More PDF activity - BOPs protection confirmed

Filed Under: Malware, SophosLabs

Today we saw another malicious PDF attempting to exploit the new zero-day vulnerability in Adobe Reader and Acrobat [CVE-2009-0658, APSA09-01]. The Sophos advisory for this vulnerability can be found here. This latest sample is also proactively detected, as Mal/JSShell-B.

I quickly fired up a goat machine, intentionally disabling this detection in the Sophos product to see how the buffer overflow protection (BOPs) would fare. Success! BOPs triggered shortly after loading the malicious PDF in Adobe Reader 9.0.0 (freshly downloaded and installed).

As in the previous attack, the payload in this case was a remote access Trojan (detected as Mal/Packer).

Whilst we wait for a patch from Adobe, to help protect yourselves from attacks:

  • Ensure you keep your products correctly updated
  • Enable runtime protection (HIPs and BOPs) - not just in alert-only mode
  • Consider some of the mitigation steps outlined in my previous post.

You might like

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s