Стани премиум член, добиј куп бенефити и поддржи ја работата на IT.mk!
  • Важно
    Имате проблем со најава или регистрација на it.mk?
    Побарајте го решението на вашиот проблем ТУКА!

Слабост кај Adobe Reader и Acrobat [верзија 8.1 и подолу]

Статус
Затворена за нови мислења.

LiquidWorm

Администратор
26 март 2007
2.674
194
www.zeroscience.mk
Release date: October 5, 2007

Vulnerability identifier: APSA07-04

CVE number: CVE-2007-5020


Платформа: Windows XP (Vista корисниците немаат гајле) со инсталиран Internet Explorer 7

Софтвер со слабости:

Adobe Reader 8.1 и постарите верзии
Adobe Acrobat Standard, Professional и Elements 8.1 и постарите верзии
Adobe Acrobat 3D


Решение:
To protect Windows XP systems with Internet Explorer 7 installed from this vulnerability, administrators can disable the mailto: option in Acrobat, Acrobat 3D 8 and Adobe Reader by modifying the application options in the Windows registry. Additionally, these changes can be added to network deployments to Windows systems.

Disclaimer: This procedure involves editing the registry. Adobe doesn't provide support for editing the registry, which contains critical system and application information. Make sure to back up the registry before modifying it. For more information about the registry, refer to Windows Help.

1. Exit Adobe Reader or Acrobat.

2. Open RegEdit. On Windows XP, go to Start > Run, type in regedit and click OK.

3. Choose File > Export.

4. Select Local Disk C for the Save in: location.

5. Type backup for File Name.

6. Choose All for the Export Range.

7. Click Save.

8. Navigate to the appropriate registry key:

Acrobat:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Adobe\Adobe Acrobat\8.0\FeatureLockDown\cDefaultLaunchURLPerms

Reader:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Adobe\Acrobat Reader\8.0\FeatureLockDown\cDefaultLaunchURLPerms

9. If tSchemePerms is set as follows:
version:1|shell:3|hcp:3|ms-help:3|ms-its:3|ms-itss:3|its:3|mk:3|mhtml:3|help:3|
disk:3|afp:3|disks:3|telnet:3|ssh:3|acrobat:2|mailto:2|file:2

10. To Disable mailto (recommended)
Modify tSchemePerms by setting the mailto: value to 3:
version:1|shell:3|hcp:3|ms-help:3|ms-its:3|ms-itss:3|its:3|mk:3|mhtml:3|help:3|
disk:3|afp:3|disks:3|telnet:3|ssh:3|acrobat:2|mailto:3|file:2

11. To set mailto to prompt
Modify tSchemePerms by removing the mailto: value:
version:1|shell:3|hcp:3|ms-help:3|ms-its:3|ms-itss:3|its:3|mk:3|mhtml:3|help:3|
disk:3|afp:3|disks:3|telnet:3|ssh:3|acrobat:2|file:2

12. Close RegEdit.

13. Restart the application.



For users who are unable to implement the above workaround, the Secure Software Engineering team is working with the Adobe Reader Engineering team on an update to versions 8.1 of Adobe Reader and Acrobat that will resolve this issue. A security bulletin will be published on http://www.adobe.com/support/security as soon as that update is available. We expect the update to be available before the end of October.
In the meantime, Adobe recommends that Acrobat and Reader customers use caution when receiving unsolicited e-mail communications requesting user action, such as opening attachments or clicking Web links.

All documented security vulnerabilities and their solutions are distributed through the Adobe security notification service. You can sign up for the service at the following URL: http://www.adobe.com/cfusion/entitlement/index.cfm?e=szalert.

Слабоста пронајдена од: Gnucitizen

Извор: http://www.adobe.com/support/security/advisories/apsa07-04.html

:rolleyes:
 
Статус
Затворена за нови мислења.

Нови мислења

Последни Теми

Статистика

Теми
45.671
Мислења
946.985
Членови
34.145
Огласи
2.013
Најнов член
Yadow
На врв Дно