Cleft of the PDF document

By Rudee on 06.06

Filed Under:

Later this was found in the new rift security of PDF documents. This rift is actually ditambal in January 2007, but opened again in the summer of this year when the news diterapkannya new method to combat spam. Spam filter to detect the spam email that has a PDF form. The vendor of spam filtering software and concluded that the form of PDF files on a potential rift security.

Currently Petko D. Petkov, chairman Gnucitizen, a Web site about the safety and security consultant in the UK have found slit security of PDF documents based JavaScript. JavaScript code will force the email client to open a PDF file that is infected with the virus.

Petkov sample code does not publish this weakness because according to him is very dangerous and in fact PDF is rife everywhere, and "time required by Adobe to improve the products they made," tulisnya on Gnucitizen.

Paul Henry, vice president of Secure Computing, said even though there is no sample code, it is the evil force to take advantage of the other weaknesses in the PDF format. "Weakness in the News as a PDF published this trigger is the only evil to be in search of more cleft security that, "he said.

According to Henry, the security is slit "trigger just waiting to live" as a PDF file you can embed JavaScript in the file, so that anti-virus scanner can not detect. "In this Web 2.0 world, it is very important to scan everything that comes from the 'cable' network, including the script-the script with the intention that suspicious-intention," he said.

Adobe said that the government is already understand this problem. "Adobe and Petkov have each other to communicate," said the company is to InternetNews.com. "Adobe is currently researching security is slit. Once this process is complete, Adobe plans menginformasikannya in Adobe Security Bulletin and Advisories page on the site."

Until now both Adobe and Secure Computing recommends: Never open a PDF file from the same source, it was not known and is not required and if received it from a source that is known is always first to confirm the source before opening it.

0 komentar for this post

Posting Komentar