The more complex a format is, the less chance there is that its security features will work in all cases. A vulnerability has turned up that lets sneaky people alter digitally signed PDF documents. A German team discovered a “shadow attack” vulnerability in the format. It’s easiest to do this if the document’s creator designed it to be altered after signing. The victim sees one set of content and signs it; the dishonest creator gets the document back, changes its appearance, and passes it on.
- Gary McGath
This blog will revert soon to fileformats.wordpress.com. The RSS feed (which already works) is fileformats.wordpress.com/rss.
- Follow Mad File Format Science on WordPress.com
Join 143 other subscribers
Path traversal bugs in archive formats
Malware has shown up which takes advantage of a path traversal bug in the WinRAR archiving utility. The bug, which reportedly existed for 19 years, is fixed in the latest version. The problem stems from an old, buggy DLL which WinRAR used. It allowed the expansion of an archive with a file that would be extracted to an absolute path rather than the destination folder. In this case, the path was the system startup folder. The next time the computer was rebooted, it would run the malware file.
Continue reading →
Comments Off on Path traversal bugs in archive formats
Posted in commentary, News
Tagged security, software, WinRAR