• Здраво и добредојдовте на форумот на IT.mk.

    Доколку сеуште не сте дел од најголемата заедница на ИТ професионалци и ентузијасти во Македонија, можете бесплатно да се - процесот нема да ви одземе повеќе од 2-3 минути, а за полесна регистрација овозможивме и регистрирање со Facebook и Steam.

Слабост кај Adobe Reader и Acrobat [верзија 8.1 и подолу]

Статус
Затворена за нови мислења.
  • Ја почнал/а темата
  • #1

LiquidWorm

Администратор
26 март 2007
2,667
183
www.zeroscience.mk
Release date: October 5, 2007

Vulnerability identifier: APSA07-04

CVE number: CVE-2007-5020


Платформа: Windows XP (Vista корисниците немаат гајле) со инсталиран Internet Explorer 7

Софтвер со слабости:

Adobe Reader 8.1 и постарите верзии
Adobe Acrobat Standard, Professional и Elements 8.1 и постарите верзии
Adobe Acrobat 3D


Решение:
To protect Windows XP systems with Internet Explorer 7 installed from this vulnerability, administrators can disable the mailto: option in Acrobat, Acrobat 3D 8 and Adobe Reader by modifying the application options in the Windows registry. Additionally, these changes can be added to network deployments to Windows systems.

Disclaimer: This procedure involves editing the registry. Adobe doesn't provide support for editing the registry, which contains critical system and application information. Make sure to back up the registry before modifying it. For more information about the registry, refer to Windows Help.
1. Exit Adobe Reader or Acrobat.

2. Open RegEdit. On Windows XP, go to Start > Run, type in regedit and click OK.

3. Choose File > Export.

4. Select Local Disk C for the Save in: location.

5. Type backup for File Name.

6. Choose All for the Export Range.

7. Click Save.

8. Navigate to the appropriate registry key:

Acrobat:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Adobe\Adobe Acrobat\8.0\FeatureLockDown\cDefaultLaunchURLPerms

Reader:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Adobe\Acrobat Reader\8.0\FeatureLockDown\cDefaultLaunchURLPerms

9. If tSchemePerms is set as follows:
version:1|shell:3|hcp:3|ms-help:3|ms-its:3|ms-itss:3|its:3|mk:3|mhtml:3|help:3|
disk:3|afp:3|disks:3|telnet:3|ssh:3|acrobat:2|mailto:2|file:2

10. To Disable mailto (recommended)
Modify tSchemePerms by setting the mailto: value to 3:
version:1|shell:3|hcp:3|ms-help:3|ms-its:3|ms-itss:3|its:3|mk:3|mhtml:3|help:3|
disk:3|afp:3|disks:3|telnet:3|ssh:3|acrobat:2|mailto:3|file:2

11. To set mailto to prompt
Modify tSchemePerms by removing the mailto: value:
version:1|shell:3|hcp:3|ms-help:3|ms-its:3|ms-itss:3|its:3|mk:3|mhtml:3|help:3|
disk:3|afp:3|disks:3|telnet:3|ssh:3|acrobat:2|file:2

12. Close RegEdit.

13. Restart the application.



For users who are unable to implement the above workaround, the Secure Software Engineering team is working with the Adobe Reader Engineering team on an update to versions 8.1 of Adobe Reader and Acrobat that will resolve this issue. A security bulletin will be published on http://www.adobe.com/support/security as soon as that update is available. We expect the update to be available before the end of October.
In the meantime, Adobe recommends that Acrobat and Reader customers use caution when receiving unsolicited e-mail communications requesting user action, such as opening attachments or clicking Web links.

All documented security vulnerabilities and their solutions are distributed through the Adobe security notification service. You can sign up for the service at the following URL: http://www.adobe.com/cfusion/entitlement/index.cfm?e=szalert.
Слабоста пронајдена од: Gnucitizen

Извор: http://www.adobe.com/support/security/advisories/apsa07-04.html

:rolleyes:
 
Статус
Затворена за нови мислења.

Нови мислења

Последни Теми

Статистика

Теми
42,646
Мислења
829,596
Членови
28,651
Најнов член
Mr.Fiki
На врв Дно