Members
  • Total Members: 14197
  • Latest: Levine
Stats
  • Total Posts: 43431
  • Total Topics: 16526
  • Online today: 2962
  • Online ever: 51419
  • (01. January 2010., 10:27:49)
Users Online
Users: 2
Guests: 2934
Total: 2936









Post reply

Name:
Email:
Subject:
Message icon:

Verification:
Type the letters shown in the picture
Listen to the letters / Request another image

Type the letters shown in the picture:
Second Anti-Bot trap, type or simply copy-paste below (only the red letters):www.codekids.ba:

shortcuts: hit alt+s to submit/post or alt+p to preview


Topic Summary

Posted by: Samker
« on: 06. March 2009., 15:12:24 »

I am constantly downloading (work related and other) PDF files - is there ANYTHING currently available that can be used to scan PDF files to detect JBIG2?

Steve

I think that CheckPoint have (authors of Zona Alarm Firewalls) have some solution.

Take a look here: http://www.checkpoint.com/defense/advisories/public/announcement/022509-adobe-pdf-protection.html

Also Steve, if you find something interesting for SCF Community please make new Topic with protection solutions and recommendations ...



Posted by: Steve_53
« on: 06. March 2009., 14:32:54 »

I am constantly downloading (work related and other) PDF files - is there ANYTHING currently available that can be used to scan PDF files to detect JBIG2?

Steve
Posted by: Samker
« on: 05. March 2009., 15:49:50 »



"With Adobe's patch for the current PDF vulnerability still some time away, news has emerged of more techniques that are available to exploit the vulnerability, this time without needing the victim to actually open a malicious file. Instead, the methods make use of a Windows Explorer Shell Extension that is installed alongside Adobe Reader, and which will trigger the exploitable code when the file is interacted with in Windows Explorer. Methods have been demonstrated of successful exploitation with a single click, with thumbnail view, and with merely hovering the mouse cursor over the affected file. There are many ways that exploits targeting the JBIG2 vulnerability could be hidden inside a PDF file, and it seems that the reliability of detection for these varying methods is spotty, at best."

(Slashdot)

Enter your email address to receive daily email with 'SCforum.info - Samker's Computer Forum' newest content:

Kursevi programiranja za ucenike u Sarajevu

Terms of Use | Privacy Policy | Advertising
TinyPortal 2.3.1 © 2005-2023