Microsoft, Adobe: PDF security flaw treatable

    Microsoft, Adobe: PDF security flaw treatable


    Posted: 13 Sep 2010
    Microsoft and Adobe Systems have announced that a recently released Microsoft toolkit can be used to block zero-day attacks targeting a security flaw in Adobe's Acrobat and Reader programs.

    In its advisory, Microsoft says the following:

    "In order to enable EMET for Adobe Reader and Acrobat you have to install EMET and run the following simple command line as an Administrator. Please note the path to the Adobe Reader and Acrobat could be different in your system (especially if you are not using a 64 bit system).

    C:\Program Files (x86)\EMET>emet_conf.exe --add "c:\program files (x86)\Adobe\Reader 9.0\Reader\acrord32.exe"

    The changes you have made may require restarting one or more applications
    Read more:

    Microsoft, Adobe: PDF security flaw treatable | Security - CNET News
    Borg 386's Avatar Posted By: Borg 386
    13 Sep 2010



  1. Posts : 2,303
    Windows 7 & Windows Vista Ultimate
       #1

    A bit more about EMET from the Security Research and Defense blog: The Enhanced Mitigation Experience Toolkit 2.0 is Now Available
      My Computer


  2. Posts : 4,772
    Windows 7 Ultimate - 64-bit | Windows 8 Pro - 64-bit
       #2

    Microsoft's anti-exploit toolkit can help mitigate PDF zero-day attack


    Microsoft's anti-exploit toolkit can help mitigate PDF zero-day attacks



    Microsoft is pushing its new Enhanced Mitigation Experience Toolkit (EMET) as a temporary mitigation for the ongoing attacks against a zero-day vulnerability in Adobe’s PDF Reader/Acrobat products.
    The EMET utility, which effectively backports anti-exploit mitigations like ASLR (Address Space Layout Randomization) and DEP (Data Execution Prevention) to older versions of Windows, would force the relocation of non ASLR-aware DLLs in Adobe’s products.
    Microsoft's anti-exploit toolkit can help mitigate PDF zero-day attacks | ZDNet
      My Computer


  3. Posts : 121
    Windows 7
       #3

    Good share
      My Computer


  4. Posts : 7,781
    Win 7 32 Home Premium, Win 7 64 Pro, Win 8.1, Win 10
    Thread Starter
       #4

    Here is some more information on EMIT that I found...

    Thanx for the link Corrine, I was wondering what it looked like...yes, I still need to put it in. When time permits....

    EMET supports both 32- and 64-bit applications and activates specific protection mechanisms in compiled binaries. It adds the following mitigations to applications that do not support them natively:

    • Structured Error Handling Overwrite Protection (SEHOP) prevents Structured Exception Handling (SEH) overwrite exploitation by performing SEH chain validation.
    • Dynamic Data Execution Prevention marks portions of a process’s memory non-executable, making it difficult to exploit memory corruption vulnerabilities.
    • NULL page allocation allocates the first page of memory before program initialization and blocks attackers from taking advantage of NULL references in user mode.
    • Heap Spray Allocation pre-allocates memory addresses to block common attacks that fill a process’s heap with specially crafted content.
    • Mandatory address space layout randomization (ASLR), as well as non-ASLR-aware modules on Windows Vista, Windows Server 2008 and Windows 7.
    • Export address table (EAT) uses hardware breakpoints to filter access to the EAT of kernel32.dll and ntdll.dll, blocks access if the instruction pointer is not inside a module, and breaks current common metasploit shellcodes.
    Read more:

    Microsoft's anti-exploit toolkit can help mitigate PDF zero-day attacks | ZDNet
      My Computer


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 10:47.
Find Us