Adobe PDF Reader Rewrite To Include Sandbox Feature

Use Netsparker


A lot of people have complained about the lack of security in Adobe PDF related products and the fact that the very architecture is insecure. There have been a whole spate of PDF related exploits and vulnerabilities lately – some of them being very serious.

It’s good to see Adobe is taking this matter seriously and rather than just issuing patch after patch (firefighting) they are trying to do something fundamentally different with their PDF reader software to fix the root cause.

Now I’m not saying this will solve all the PDF related problems, but it’s good to see them doing a ground up rebuild and implementing safety features like sandboxing.

Adobe has offered more details of the ‘sandbox’ security feature it plans to implement to secure its hugely popular but often-attacked PDF Reader software. First announced last July, the latest description put out by Adobe’s security development team makes clear that Reader’s new ‘protected mode’ will be no mere bolt-on. This is starting to look like a ground-up re-design of how the program operates, almost from scratch.

The new Reader design will see core and risky PDF functions such as font rendering, Javascript execution, 3D rendering and image parsing happen within the confines of the application itself, isolating these from the privileges of the operating system.

This effectively relegates Reader to a new rung of privilege below that if the system user, which stops the application simply accessing key parts of the OS such as the Registry or file system as it likes. Instead all such calls will have to go through a trusted broker process if they want to communicate beyond the sandbox.

It’s a good model though and similar to what Google have done with the Chrome browser.

Separating the ‘dangerous’ parts from the parts that have access to the underlying OS is extremely important, JavaScript execution of course being the main culprit. But other exploits have focused on font and image rendering so they need to be kept away too.


The new design won’t stop exploits targeting Reader but they will limit what can be done from within its confines. At the moment, that is more or less anything the attacker wants, including being able to take over the system.

“The challenge is to enable sandboxing while keeping user workflows functional without turning off features users depend on,” says Adobe’s blog.

As the developers admit, the potential hole in security is always the operating system itself, which can still be compromised, although exploiting such vulnerabilities is as easy as it easy a few years back. Microsoft’s software development lifecycle (SDL) has tightened up code security. The first version sandbox will also not protect against read access to the file system (which allows data theft) or registry, or restricting network access, but future versions will look at this aspect of security.

Adding defence mechanism to specific applications other than browsers is an unusual approach to application design, but Reader’s security troubles have gone beyond that of most applications.

They have a pretty tough challenge on their hands as we know the more security you implement the less usability you have. So they have a precarious balance between retaining features which users require and limiting the amount of damage the software can do to the OS.

But it’s certainly a step in the right direction and as stated above, it certainly wont prevent there being any more exploits in Adobe’s PDF Reader – but it will limit the damage any future exploits can cause.

Source: Network World

Posted in: Countermeasures, Exploits/Vulnerabilities

, , , , ,


Latest Posts:


Four Year Old libSSH Bug Leaves Servers Wide Open Four Year Old libssh Bug Leaves Servers Wide Open
A fairly serious 4-year old libssh bug has left servers vulnerable to remote compromise, fortunately, the attack surface isn't that big as neither OpenSSH or the GitHub implementation are affected.
CHIPSEC - Platform Security Assessment Framework CHIPSEC – Platform Security Assessment Framework For Firmware Hacking
CHIPSEC is a platform security assessment framework for PCs including hardware, system firmware (BIOS/UEFI), and platform components for firmware hacking.
How To Recover When Your Website Got Hacked How To Recover When Your Website Got Hacked
The array of easily available Hacking Tools out there now is astounding, combined with self-propagating malware, people often come to me when their website got hacked and they don't know what to do, or even where to start.
HTTrack - Website Downloader Copier & Site Ripper Download HTTrack – Website Downloader Copier & Site Ripper Download
HTTrack is a free and easy-to-use offline browser utility which acts as a website downloader and a site ripper for copying websites and downloading them for offline viewing.
sshLooter - Script To Steal SSH Passwords sshLooter – Script To Steal SSH Passwords
sshLooter is a Python script using a PAM module to steal SSH passwords by logging the password and notifying the admin of the script via Telegram when a user logs in.
Intercepter-NG - Android App For Hacking Intercepter-NG – Android App For Hacking
Intercepter-NG is a multi functional network toolkit including an Android app for hacking, the main purpose is to recover interesting data from the network stream and perform different kinds of MiTM attacks.


Comments are closed.