Desktop Viewer Applications

Legend:

  • insecureinsecure - Exfiltration (no user interaction)
  • insecure - Exfiltration (with user interaction)
  • secure - No exfiltration / not vulnerable

Windows

Application Version Direct Exfiltration CBC Gadgets
Adobe Acrobat DC 2019.008.20081 insecureinsecure insecure
Foxit Reader 9.2.0.9297 insecure insecure
PDF-XChange Viewer 2.5.322.9 insecure insecure insecure
Perfect PDF Reader 8.0.3.5 insecure insecure insecure insecure
PDF Studio Viewer 2018.1.0 insecure insecure insecure insecure
Nitro Reader 5.5.9.2 insecure insecure insecure
Acrobat Pro DC 2017.011.30127 insecure insecure insecure
Foxit PhantomPDF 9.5.0.20723 insecure insecure
PDF-XChange Editor 7.0.326.1 insecure insecure insecure
Perfect PDF Premium 10.0.0.1 insecure insecure insecure insecure
PDF Studio Pro 12.0.7 insecure insecure insecure insecure
Nitro Pro 12.2.0.228 insecure insecure insecure insecure
Nuance Power PDF 3.0.0.17 insecure insecure insecure
iSkysoft PDF Editor 6.4.2.3521 insecure insecure
Master PDF Editor 5.1.36 insecure insecure insecure insecure
Soda PDF Desktop 11.0.16.2797) insecure insecure
PDF Architect 7.0.23.3193 insecure insecure
PDFelement 6.8.0.3523 insecure insecure

Mac

Application Version Direct Exfiltration CBC Gadgets
Preview 3.32.0 secure insecure
Skim 1.4.37 secure insecure

Linux

Application Version Direct Exfiltration CBC Gadgets
Evince 10.0.944.4 insecure insecure
Okular 1.7.3 insecure insecure
MuPDF 1.14.0 insecure insecure

Web

Application Version Direct Exfiltration CBC Gadgets
Chrome 70.0.3538.67 insecure insecure insecure insecure
Firefox 66.0.2 secure insecure
Safari 11.0.3 secure insecure
Opera 57.0.3098.106 insecure insecure insecure insecure

Download PoCs

You can get all Proof-of-Concept exploits in one .tgz file via the following link.

CVEs/Fixes

  • Adobe: CVE-2019-8237
  • MacOS, PDFKit: CVE-2019-8772
  • Google Chrome (private bugs 959183, 959795)
  • PDF-XChange Editor/Viewer: Fix against Direct Exfiltration by throwing a warning and letting the user decide if the document is trusted. If not -- only encrypted parts are processed. No countermeasure against CBC gadgets is implemented.
  • Master PDF Editor: no countermeasures will be implemented

Responsible Disclosure

As part of our research, we started a responsible disclosure procedure.

In cooperation with the CERT-Bund, the national CERT section of BSI, we contacted all vendors, provided proof-of-concept exploits, and helped them to fix the issues.