Virtual Event Today: Ransomware Resilience & Recovery Summit - Login to Live Event
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Adobe’s Hunt for Sandbox Bypass Flaw a Frustrating Exercise

SAN JUAN, PUERTO RICO – Trying to identify a vulnerability and fixing it sounds unbelievably frustrating if the person who found it doesn’t offer any details. Adobe outlined some of the challenges vendors face with “partial disclosure” at a security conference that took place this week.

SAN JUAN, PUERTO RICO – Trying to identify a vulnerability and fixing it sounds unbelievably frustrating if the person who found it doesn’t offer any details. Adobe outlined some of the challenges vendors face with “partial disclosure” at a security conference that took place this week.

Shortly after Russian security company Group IB reported a critical security flaw in Adobe Reader which could bypass the sandbox and compromise the user computer, Adobe’s Product Security Incident Response Team began digging through the sandbox code to identify the issue, two security engineers from Adobe told attendees at the Kaspersky Lab Security Analyst Summit on Monday. Three months, 90 emails, and 60,000 words later, Adobe is still in the dark as it has not been able to reproduce the vulnerability, and still has no additional information, said David Lenoe, PSIRT’s group manager. Group-IB repeatedly promised to send a proof-of-concept code for the sandbox bypass, but to this day, still has not sent it, Lenoe said.

Kaspersky Lab SAS 2013 Puerto RicoFor Adobe, the possible sandbox bypass was bad news. The company had been touting the benefits of the sandbox technology in Reader and Acrobat ever since it was introduced in Adobe Reader X. The sandbox trapped several zero-day vulnerabilities over the past two years which compromised earlier versions of Reader and Acrobat, and prevented them from executing. If attackers had somehow found a flaw that allowed them to break out of the sandbox, it was something Adobe wanted to address immediately, Lenoe said.

“The Reader sandbox is a key part of our security story. It’s been a really successful way for us to prevent exploits,” Lenoe said.

The original report was a “partial disclosure,” in that the only available information came from a YouTube video demonstrating the attack and a release from Group-IB indicating an exploit had been added to a private version of Blackhole exploit kit being sold on underground markets for $30,000 to $50,000. The security team dug into the code and relied on their past experience with sandbox exploits to try to identify the issue. First of all, the team decided to operate on the assumption the exploit worked on Windows XP, which didn’t have defense mitigation technologies such as DEP and ASLR built into the operating system.

“We were hoping for a proof of concept, but we had a video,” said Lenoe. The team also scrutinized the video and found little clues, such as grabbing the exact version of Reader being used by looking at the splash screen in the clip. YouTube exploit proof-of-concepts are difficult for companies to work with because there’s only so much information available, and fake videos abound. Adobe had to glean whatever insights it could from the video clip.

The engineers weren’t sure whether the issue was related to process termination or a validation error, if it was a registry issue, or if it had something to do with a LogTransport2 utility, Karthik Raman, a security researcher with Adobe Secure Software Engineering Team, told attendees. “We really didn’t know,” he said. Group-IB told Adobe there were several examples of the PoC available, and credited independent researcher Kris Kasperski with the discovery. Kasperski apparently was the researcher who had originally posted the video demonstrating the exploit on YouTube, Lenoe said. Kasperski and

Group-IB told Adobe the issue was related to malformed data. Kasperski told Adobe it was a typical use-after-free flaw and it succeeded on XP because there was no DEP or ASLR, just as the company had guessed.

Based on the additional information, Adobe thought the vulnerability may be related to a PDF structural element, but it was unable to reproduce the issue without a proof-of-concept, Raman said. Adobe was in the process of fixing a race condition issue involving threads that seemed to be a similar situation, but it wasn’t sure if that internally-known issue was the same as the reported bug, he said. Adobe proceeded with the fix for the race condition flaw anyway. “We found the crash and had fixed it, but we still had to verify it with the proof of concept,” Lenoe said.

Advertisement. Scroll to continue reading.

Kasperski eventually gave Adobe the name of the Metasploit module he used, but didn’t share the actual bypass flaw. The module can’t be used in isolation, so without the actual exploit, the company was still not sure what the problem was. Adobe eventually received a VM image, but the team couldn’t reproduce the reported issue, Lenoe said.

None of Adobe’s partners had any information about the exploit or vulnerability, which made it harder for Adobe to get any information, Lenoe said.

“When technical details are scarce, the approach to remediate can become more art than science,” Lenoe said. As far as Group-IB is concerned, the company cooperated fully with Adobe. “We provided them all we had, moreover, connected them with Kris Kaspersky, as well as provided a VM Ware image,” Andrey Komarov, head of international projects at Group-IB told SecurityWeek. “We are not the authors of exploits, we do threat intelligence only,” Komarov said.

“We still don’t know whether the bug we fixed is the same race condition Kris Kasperski was talking about,” Lenoe said.

Komarov noted that Reader and two other products had been patched. This suggests that Adobe did find the correct issue and fixed it successfully.

Lenoe said to this day, Adobe still has not seen any exploit successfully bypass the sandbox in Reader and Acrobat.

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

Professional services company Slalom has appointed Christopher Burger as its first CISO.

Allied Universal announced that Deanna Steele has joined the company as CIO for North America.

More People On The Move

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Vulnerabilities

A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Vulnerabilities

Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.

IoT Security

A vulnerability affecting Dahua cameras and video recorders can be exploited by threat actors to modify a device’s system time.