LiquidWorm
Администратор
Release date: October 5, 2007
Vulnerability identifier: APSA07-04
CVE number: CVE-2007-5020
Платформа: Windows XP (Vista корисниците немаат гајле) со инсталиран Internet Explorer 7
Софтвер со слабости:
Adobe Reader 8.1 и постарите верзии
Adobe Acrobat Standard, Professional и Elements 8.1 и постарите верзии
Adobe Acrobat 3D
Решение:
1. Exit Adobe Reader or Acrobat.
2. Open RegEdit. On Windows XP, go to Start > Run, type in regedit and click OK.
3. Choose File > Export.
4. Select Local Disk C for the Save in: location.
5. Type backup for File Name.
6. Choose All for the Export Range.
7. Click Save.
8. Navigate to the appropriate registry key:
Acrobat:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Adobe\Adobe Acrobat\8.0\FeatureLockDown\cDefaultLaunchURLPerms
Reader:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Adobe\Acrobat Reader\8.0\FeatureLockDown\cDefaultLaunchURLPerms
9. If tSchemePerms is set as follows:
version:1|shell:3|hcp:3|ms-help:3|ms-its:3|ms-itss:3|its:3|mk:3|mhtml:3|help:3|
disk:3|afp:3|disks:3|telnet:3|ssh:3|acrobat:2|mailto:2|file:2
10. To Disable mailto (recommended)
Modify tSchemePerms by setting the mailto: value to 3:
version:1|shell:3|hcp:3|ms-help:3|ms-its:3|ms-itss:3|its:3|mk:3|mhtml:3|help:3|
disk:3|afp:3|disks:3|telnet:3|ssh:3|acrobat:2|mailto:3|file:2
11. To set mailto to prompt
Modify tSchemePerms by removing the mailto: value:
version:1|shell:3|hcp:3|ms-help:3|ms-its:3|ms-itss:3|its:3|mk:3|mhtml:3|help:3|
disk:3|afp:3|disks:3|telnet:3|ssh:3|acrobat:2|file:2
12. Close RegEdit.
13. Restart the application.
Слабоста пронајдена од: Gnucitizen
Извор: http://www.adobe.com/support/security/advisories/apsa07-04.html

Vulnerability identifier: APSA07-04
CVE number: CVE-2007-5020
Платформа: Windows XP (Vista корисниците немаат гајле) со инсталиран Internet Explorer 7
Софтвер со слабости:
Adobe Reader 8.1 и постарите верзии
Adobe Acrobat Standard, Professional и Elements 8.1 и постарите верзии
Adobe Acrobat 3D
Решение:
To protect Windows XP systems with Internet Explorer 7 installed from this vulnerability, administrators can disable the mailto: option in Acrobat, Acrobat 3D 8 and Adobe Reader by modifying the application options in the Windows registry. Additionally, these changes can be added to network deployments to Windows systems.
Disclaimer: This procedure involves editing the registry. Adobe doesn't provide support for editing the registry, which contains critical system and application information. Make sure to back up the registry before modifying it. For more information about the registry, refer to Windows Help.
1. Exit Adobe Reader or Acrobat.
2. Open RegEdit. On Windows XP, go to Start > Run, type in regedit and click OK.
3. Choose File > Export.
4. Select Local Disk C for the Save in: location.
5. Type backup for File Name.
6. Choose All for the Export Range.
7. Click Save.
8. Navigate to the appropriate registry key:
Acrobat:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Adobe\Adobe Acrobat\8.0\FeatureLockDown\cDefaultLaunchURLPerms
Reader:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Adobe\Acrobat Reader\8.0\FeatureLockDown\cDefaultLaunchURLPerms
9. If tSchemePerms is set as follows:
version:1|shell:3|hcp:3|ms-help:3|ms-its:3|ms-itss:3|its:3|mk:3|mhtml:3|help:3|
disk:3|afp:3|disks:3|telnet:3|ssh:3|acrobat:2|mailto:2|file:2
10. To Disable mailto (recommended)
Modify tSchemePerms by setting the mailto: value to 3:
version:1|shell:3|hcp:3|ms-help:3|ms-its:3|ms-itss:3|its:3|mk:3|mhtml:3|help:3|
disk:3|afp:3|disks:3|telnet:3|ssh:3|acrobat:2|mailto:3|file:2
11. To set mailto to prompt
Modify tSchemePerms by removing the mailto: value:
version:1|shell:3|hcp:3|ms-help:3|ms-its:3|ms-itss:3|its:3|mk:3|mhtml:3|help:3|
disk:3|afp:3|disks:3|telnet:3|ssh:3|acrobat:2|file:2
12. Close RegEdit.
13. Restart the application.
For users who are unable to implement the above workaround, the Secure Software Engineering team is working with the Adobe Reader Engineering team on an update to versions 8.1 of Adobe Reader and Acrobat that will resolve this issue. A security bulletin will be published on http://www.adobe.com/support/security as soon as that update is available. We expect the update to be available before the end of October.
In the meantime, Adobe recommends that Acrobat and Reader customers use caution when receiving unsolicited e-mail communications requesting user action, such as opening attachments or clicking Web links.
All documented security vulnerabilities and their solutions are distributed through the Adobe security notification service. You can sign up for the service at the following URL: http://www.adobe.com/cfusion/entitlement/index.cfm?e=szalert.
Слабоста пронајдена од: Gnucitizen
Извор: http://www.adobe.com/support/security/advisories/apsa07-04.html