File-stealing vulnerability found in Firefox PDF reader

Posted by   Virus Bulletin on   Aug 7, 2015

Both Windows and Linux users actively being targeted.

If, like me, you are suffering from vulnerability fatigue after so many flaws and weaknesses having been disclosed in Las Vegas this week, you may be tempted to ignore the advisory Mozilla released yesterday. However, I strongly advise you don't.

The company says it has been made aware of a vulnerability in the PDF reader built into its flagship Firefox browser. The vulnerability allows an attacker to create a specially crafted PDF that injects JavaScript code into the local file context. This could be used to upload local files to a server controlled by the attacker.

So far, there are no signs that the vulnerability allows for remote code to be executed on the target's machine, thus making it less likely to be included into exploit kits, yet that doesn't mean users of the browser shouldn't been concerned.

Indeed, the vulnerability is already known to have been exploited in the wild, apparently through advertisements on a Russian news site. This exploit targeted both Windows and Linux machines. In the former case it looked for configuration files for programs like Filezilla and subversion, obviously looking for credentials that could be exploited.

On Linux, the exploit unsurprisingly uploaded the /etc/passwd file, as well as private SSH keys and Bash and MySQL history. It is not hard to imagine how an attacker could use this information. Currently, no attacks against Mac users have been spotted, but they are just as vulnerable.

If you are using Firefox, you are urged to upgrade to version 39.0.3 of the browser, which patches the vulnerability. Or, if you are running the extended support release, to version 38.1.1. If you're a Linux user, it might also be a good opportunity to think about whether you want your shell and MySQL histories to be stored on disk.

Posted on 07 August 2015 by Martijn Grooten

twitter.png
fb.png
linkedin.png
googleplus.png
reddit.png

 

Latest posts:

VB2018 preview: Unpacking the packed unpacker: reversing an Android anti-analysis library

At VB2018, Google researcher Maddie Stone will present an analysis of the multi-layered 'WeddingCake' anti-analysis library used by many Android malware families.

VB2018 preview: From drive-by download to drive-by mining

At VB2018, Malwarebytes researcher Jérôme Segura will discuss the rise of drive-by cryptocurrency mining, explaining how it works and putting it in the broader context of changes in the cybercrime landscape.

Red Eyes threat group targets North Korean defectors

A research paper by AhnLab researcher Minseok Cha looks at the activities of the Red Eyes threat group (also known as Group 123 and APT 37), whose targets include North Korean defectors, as well as journalists and human rights defenders focused on…

VB announces Threat Intelligence Summit to take place during VB2018

We are very excited to announce a special summit, as part of VB2018, that will be dedicated to all aspects of threat intelligence.

VB2018 Small Talk: An industry approach for unwanted software criteria and clean requirements

An industry approach for defining and detecting unwanted software to be presented and discussed at the Virus Bulletin conference.

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.