Monorail Project: project-zero Issues People Development process History Sign in
New issue
Advanced search Search tips
"me" keyword ignored because you are not signed in.
Starred by 2 users
Status: Fixed
Owner:
Closed: Sep 2014
Cc:



Sign in to add a comment
Windows Acrobat Reader 11 Sandbox Escape in NtSetInformationFile
Project Member Reported by forshaw@google.com, Aug 20 2014 Back to list
The Acrobat Reader Windows sandbox is vulnerable to NTFS junction attack to write an arbitrary file to the filesystem under user permissions. This could be used to break out of the sandbox leading to execution at higher privileges.

The specific vulnerability is in the handling of the NtSetInformationFile system call hook. This function attempts to resolve the real destination of the rename. If the destination is a junction it reads the junction destination, however it only does this for the first level so it's possible to have a chain of junctions. This allows code in the sandbox to write an arbitrary file to the filesystem.

Version tested: 11.0.8 (10.* not tested)

Attached is a PoC, including source and pre-compiled binaries. To test the PoC run the following steps:

1) Copy Testdll.dll and InjectDll.exe to a location the sandboxed process can read.
2) Run the command Injectdll.exe pid path\to\testdll.dll where pid is the process ID of a sandboxed Adobe Reader process. 
3) Successful exploitation is indicated by a new file being created on the desktop call 'abc'. 

This bug is subject to a 90 day disclosure deadline. If 90 days elapse
without a broadly available patch, then the bug report will automatically
become visible to the public.

 
poc.7z
64.7 KB Download
Project Member Comment 1 by forshaw@google.com, Sep 8 2014
Labels: CVE-2014-0568
Comment 2 by cevans@google.com, Sep 16 2014
Labels: Fixed-2014-Sep-16
Status: Fixed
Fixed here: http://helpx.adobe.com/security/products/reader/apsb14-20.html
Project Member Comment 3 by forshaw@google.com, Sep 24 2014
Labels: -Restrict-View-Commit
Sign in to add a comment