STUDY.md
  • Windows ์ด๋ฏธ์ง€, ๋ฌธ์„œ ๋Œ€ํ‘œ ๋ทฐ์–ด ์ข…๋ฅ˜ ์•Œ์•„๋ณด๊ธฐ (+ ์˜ˆ์ƒ๋˜๋Š” ์ทจ์•ฝ์ )
    2024๋…„ 09์›” 04์ผ 00์‹œ 04๋ถ„ 38์ดˆ์— ์—…๋กœ๋“œ ๋œ ๊ธ€์ž…๋‹ˆ๋‹ค.
    ์ž‘์„ฑ์ž: banda โ €

     

     

     

    ์œˆ๋„์šฐ ๊ฐ€์ƒ๋จธ์‹ ์— ๋‹ค์Œ๊ณผ ๊ฐ™์€ ๋‹ค์–‘ํ•œ ๋ทฐ์–ด๋ฅผ ๋‹ค์šด๋ฐ›์•„๋ณด์•˜๋‹ค.

    ๋ชจ๋‘ ๋‹ค ์‚ฌ์šฉํ•˜์ง€ ์•Š์„ ์ˆ˜๋„ ์žˆ๊ณ , ๋ฒ„์ „์„ ๋‹ค์šดํ•˜๊ฒŒ๋  ์ˆ˜๋„ ์žˆ์ง€๋งŒ ์ผ๋‹จ ๋„๊ตฌ๋ฅผ ๋ฐ›์•„ ๊ฐ์„ ์žก์„ ์ˆ˜ ์žˆ๋„๋ก ํ–ˆ๋‹ค.

     

     

     


     ๋‚˜ํƒ€๋‚  ์ˆ˜ ์žˆ๋Š” ๋ทฐ์–ด ์ทจ์•ฝ์  

    Cisco๊ฐ€ 2024๋…„ 2์›” ๊ฒฝ ๋ฐœํ‘œํ•œ ๋‚ด์šฉ์ธ๋ฐ, pdf ๋ทฐ์–ด๋กœ ๊ฐ€์žฅ ๋งŽ์ด ์‚ฌ์šฉ๋˜๋Š” Adobe Acrobat Reader์—์„œ๋งŒ 7๊ฐœ์˜ ๋ทฐ์–ด ์ทจ์•ฝ์ ์„ ๋ฐœ๊ฒฌํ–ˆ๋‹ค๋Š” ... ๋‚ด์šฉ์ด๋‹ค.

     

    ์ด์ฒ˜๋Ÿผ ๊ฐ€์žฅ ๋งŽ์ด ์‚ฌ์šฉ๋˜๋Š” pdf, ์ด๋ฏธ์ง€ ๋ทฐ์–ด ์กฐ์ฐจ ์•„์ง๋„ ์ทจ์•ฝ์ ์— ๋…ธ์ถœ๋˜์–ด์žˆ์„ ์ˆ˜ ์žˆ๋‹ค๋Š” ์˜ํ˜น์ด ์ƒ๊ฒผ๋‹ค.

    ๋Œ€ํ‘œ์ ์œผ๋กœ ์ผ์–ด๋‚  ์ˆ˜ ์žˆ๋Š” ์ทจ์•ฝ์  ์ข…๋ฅ˜๋ฅผ ์ ์–ด๋ณด๋„๋ก ํ•˜๊ฒ ๋‹ค.

     

     

    1. ๋ฒ„ํผ ์˜ค๋ฒ„ํ”Œ๋กœ์šฐ (Buffer Overflow)

    ๊ด€๋ จ ์ž๋ฃŒ

    https://www.zscaler.com/blogs/security-research/analysis-adobe-acrobat-pro-dc-solid-framework-heap-based-buffer-overflow

    https://www.fortiguard.com/encyclopedia/ips/28115

    https://www.exploit-db.com/exploits/24463

    https://www.cvedetails.com/cve/CVE-2008-5492/

    https://www.syxsense.com/syxsense-securityarticles/graphics_software/syx-1001-12162.html

     

    ๋งํฌ๋ฅผ ํด๋ฆญํ•ด๋ณด๋ฉด ๋ณด์•ˆ์ด ์ฒ ์ €ํ•˜์ง€ ๋ชปํ•œ ๋ทฐ์–ด์—์„œ ๋‹ค์–‘ํ•˜๊ฒŒ Buffer Overflow ์ทจ์•ฝ์ ์ด ๋‚˜ํƒ€๋‚˜๊ณ  ์žˆ์œผ๋ฉฐ, ์‹ฌ์ง€์–ด Adobe Acrobat Reader์กฐ์ฐจ Buffer Overflow Vulnerability๊ฐ€ ๋‚˜ํƒ€๋‚œ ์ ์ด ์žˆ๋‹ค. ์ฆ‰, ๊ฐ€์žฅ ๋Œ€ํ‘œ์ ์œผ๋กœ ๋‚˜ํƒ€๋‚  ์ˆ˜ ์žˆ๋Š” ์ทจ์•ฝ์ ์ด๋‹ค.

     

    ๋‚˜ํƒ€๋‚˜๋Š” ๋ฒ„ํผ ์˜ค๋ฒ„ํ”Œ๋กœ์šฐ ์ทจ์•ฝ์  ์ข…๋ฅ˜๋ฅผ ๋ณด๋ฉด Stack ๊ธฐ๋ฐ˜, Heap ๊ธฐ๋ฐ˜ ๋‘ ๊ฐ€์ง€๋กœ ๋‚˜๋‰œ๋‹ค.

     

    Heap Buffer Oveflow

    heap ์˜์—ญ์—์„œ๋Š” ์ฃผ๋กœ ํฌ์ธํ„ฐ๋ฅผ ํ†ตํ•ด ๋™์  ๋ฉ”๋ชจ๋ฆฌ ํ• ๋‹น์„ ํ•˜๊ณ  ์ด๋ฅผ ๋‹ค์‹œ ๋Œ๋ ค์ค€๋‹ค.

    ๋”ฐ๋ผ์„œ ํ•จ์ˆ˜ ํฌ์ธํ„ฐ์™€ ๊ฐ™์€ ๋ถ€๋ถ„์„ ์กฐ์ž‘ํ•ด ์ทจ์•ฝ์ ์„ ๋ฐœ์ƒ์‹œํ‚ฌ ์ˆ˜ ์žˆ๋‹ค.

    RET ๋ณ€์กฐ๊ฐ€ ๋ถˆ๊ฐ€๋Šฅํ•˜๊ณ , ์ฃผ๋กœ ํ•จ์ˆ˜ ํฌ์ธํ„ฐ์™€ ๊ฐ™์€ ์ค‘์š”ํ•œ ๋ฐ์ดํ„ฐ ๊ตฌ์กฐ๋ฅผ ๋ฎ์–ด์”Œ์–ด ์˜ค๋ฒ„ํ”Œ๋กœ์šฐ๋ฅผ ๋ฐœ์ƒ์‹œํ‚จ๋‹ค.

     

    Stack Buffer Overflow

    stack ์˜์—ญ์—์„œ๋Š” ์ง€์—ญ ๋ณ€์ˆ˜์™€ ๋งค๊ฐœ ๋ณ€์ˆ˜๊ฐ€ ์œ„์น˜ํ•˜๋ฉฐ ํ•จ์ˆ˜๊ฐ€ ํ˜ธ์ถœ๋  ๋•Œ ๋ฐ์ดํ„ฐ๊ฐ€ ์Šคํƒ์— ์Œ“์ด๊ณ , ์ข…๋ฃŒ๋˜๋ฉด ๋ฐ์ดํ„ฐ๊ฐ€ ์ œ๊ฑฐ๋œ๋‹ค. stack์ด ๋ฒ„ํผ๋ฅผ ์ดˆ๊ณผ ์‚ฌ์šฉํ•  ๊ฒฝ์šฐ (ํ•œ๊ณ„์น˜๋ฅผ ๋„˜์„ ๊ฒฝ์šฐ) ๋ณต๊ท€ ์ฃผ์†Œ๋ฅผ ์กฐ์ž‘ํ•˜๊ฑฐ๋‚˜ ์˜๋„ํ•˜์ง€ ์•Š์€ ์ฝ”๋“œ๊ฐ€ ์‹คํ–‰๋  ์ˆ˜ ์žˆ๋Š” ์ทจ์•ฝ์ ์ด ์ƒ๊ธธ ์ˆ˜ ์žˆ๋‹ค.

     

     

    2. ํฌ๋งท ์ŠคํŠธ๋ง ์ทจ์•ฝ์  (Format String Vulnerability)

    https://github.com/advisories/GHSA-xg26-px52-wxv6

    https://vuldb.com/?id.263474

    https://github.com/advisories/GHSA-7pf5-h579-9v94

    https://github.com/MaherAzzouzi/CVE-2022-36163

     

    https://github.com/atxsinn3r/atxsinn3r.github.io/blob/master/writeups/format_string_leak.md

     

    atxsinn3r.github.io/writeups/format_string_leak.md at master · atxsinn3r/atxsinn3r.github.io

    Contribute to atxsinn3r/atxsinn3r.github.io development by creating an account on GitHub.

    github.com

     

    ํ”„๋กœ๊ทธ๋žจ์— ์ž…๋ ฅ๋œ ๋ฌธ์ž ๋ฐ์ดํ„ฐ๋ฅผ ๋ช…๋ น์–ด๋กœ ๋ฐ›์•„๋“ค์ผ ๋•Œ ๋‚˜ํƒ€๋‚˜๋Š” ์ทจ์•ฝ์ ์ด๋‹ค.

    ๋งŒ์•ฝ ์™ธ๋ถ€์—์„œ ์ž…๋ ฅ๋œ ์„œ์‹ ๋ฌธ์ž๋ฅผ ๊ฒ€์ฆํ•˜์ง€ ์•Š์€ ์ฑ„๋กœ ํฌ๋งท ์ŠคํŠธ๋ง ๊ทธ๋Œ€๋กœ ์‚ฌ์šฉํ•  ๊ฒฝ์šฐ, ๊ณต๊ฒฉ์ž๊ฐ€ ์›ํ•˜๋Š” RET ์œ„์น˜๋กœ ์ด๋™ํ•˜๊ฑฐ๋‚˜, ํŠน์ •ํ•œ ๋ฉ”๋ชจ๋ฆฌ ๋‚ด์šฉ์„ ํ™•์ธํ•  ์ˆ˜ ์žˆ๊ฒŒ ๋˜๊ฑฐ๋‚˜, ์ž„์˜ ์ฝ”๋“œ๊ฐ€ ์‹คํ–‰๋  ์ˆ˜ ์žˆ๋„๋ก ํ•œ๋‹ค.

    ( %d %f %c %s %x %n ๋“ฑ์˜ ํŒจํ„ด์„ ์‚ฌ์šฉ )

     

     

     

    3. ๋ฌธ์„œํ˜• ์•…์„ฑ์ฝ”๋“œ ( ์•…์„ฑ pdf, ์ด๋ฏธ์ง€ ํŒŒ์ผ ์‹คํ–‰ )

    malicious file execution

     

     

     

    ์—ฌ๊ธฐ์„œ ๊ต‰์žฅํžˆ ๋งŽ์€ ๋ฌธ์„œํ˜• ์•…์„ฑ์ฝ”๋“œ ์‚ฌ๋ก€๋ฅผ ํ™•์ธํ•  ์ˆ˜ ์žˆ๋‹ค.

    https://attack.mitre.org/techniques/T1204/002/

     

    User Execution: Malicious File, Sub-technique T1204.002 - Enterprise | MITRE ATT&CK®

     

    attack.mitre.org

     

     

    ํŠน์ •ํ•œ ํŒŒ์ผ ๋ฌธ์„œ๋ฅผ ๋ทฐ์–ด๋กœ ์—ด๋ฉด ์•…์„ฑ ์ฝ”๋“œ ์‹คํ–‰์œผ๋กœ ์ด์–ด์ง€๊ฒŒ ์œ ๋„ํ•˜๊ฑฐ๋‚˜, ์‚ฌ์šฉ์ž ๊ถŒํ•œ์„ ํƒˆ์ทจํ•œ๋‹ค.

    ๊ณต๊ฒฉ์ž๋Š” ๋‹ค์–‘ํ•œ ํŒŒ์ผ ํ˜•์‹์„ ์‚ฌ์šฉํ•  ์ˆ˜ ์žˆ์œผ๋ฉฐ ํŒŒ์ผ ์‹คํ–‰ ์œ ๋„๋ฅผ ์œ„ํ•ด ๋‹ค์–‘ํ•œ ์‚ฌํšŒ๊ณตํ•™์  ๊ธฐ๋ฒ•์„ ์‚ฌ์šฉํ•œ๋‹ค.

    ๋˜ํ•œ ๋ฌธ์„œ๋‚˜ ์ด๋ฏธ์ง€ ๋‚ด์šฉ์—์„œ ๊ณต๊ฒฉ์„ ํ™•์ธํ•  ์ˆ˜ ์—†๋„๋ก ์˜ค๋ธŒ์ ํŠธ ํ˜•ํƒœ ๋“ฑ์œผ๋กœ ์œ„์žฅํ•˜๊ฑฐ๋‚˜ ์ˆจ๊ฒจ ํƒ์ง€ ํ•˜๊ธฐ๊ฐ€ ๊นŒ๋‹ค๋กœ์šธ ์ˆ˜ ์žˆ๋‹ค.

     

     

     

     

    4. ๋ฒ”์œ„๋ฅผ ๋ฒ—์–ด๋‚œ ์ฝ๊ธฐ ์ทจ์•ฝ์  (Out-of-bounds read vulnerability)

     

    ๊ตฌ๊ธ€๋ง์„ ํ•ด๋ณด๋‹ˆ ํ˜„์žฌ๊นŒ์ง€๋„ ์ƒ๋‹นํžˆ ๋ฐœ์ƒ๋˜๊ณ  ์žˆ๋Š” ์ทจ์•ฝ์ ์ธ ๊ฒƒ ๊ฐ™์•„์„œ ๊ฐ€์ ธ์™”๋‹ค.

    ํŠนํžˆ Cisco์—์„œ ๋ฐœํ‘œํ•œ ์ž๋ฃŒ๋ฅผ ๋ณด๋ฉด adobe reader์—์„œ 2024๋…„์— ๋ฐœ๊ฒฌ๋œ ์ทจ์•ฝ์ ๋งŒ 3~4๊ฑด์ด ๋ฐœ๊ฒฌ๋˜์—ˆ๋‹ค.

     

    ์–ด๋–ค ๋ทฐ์–ด ํ”„๋กœ๊ทธ๋žจ์ด ํŠน์ •ํ•œ ํŒŒ์ผ์„ ์ฝ์œผ๋ ค๊ณ  ํ•  ๋•Œ, ๋ฉ”๋ชจ๋ฆฌ์˜ ์œ ํšจ ๋ฒ”์œ„๋ฅผ ์ดˆ๊ณผํ•ด ์ฝ์œผ๋ ค๊ณ  ํ•˜๋ฉด ์ถฉ๋Œ์ด๋‚˜ ์˜ค๋ฅ˜๋ฅผ ๋ฐœ์ƒ์‹œํ‚ฌ ์ˆ˜ ์žˆ๋‹ค. ์ด์™€๊ฐ™์€ ๋ฌธ์ œ๊ฐ€ ์ผ์–ด๋‚˜๋Š” ์ด์œ ๋Š” ๋ทฐ์–ด๊ฐ€ ์ž˜๋ชป๋œ ์ธ๋ฑ์Šค ๊ณ„์‚ฐ์„ ํ•˜๊ฑฐ๋‚˜, ์ž˜๋ชป๋œ ํฌ์ธํ„ฐ ์—ฐ์‚ฐ์„ ํ•˜๋Š” ๋“ฑ์˜ ํ–‰๋™์„ ํ–ˆ์„ ๋•Œ ๋ฐœ์ƒํ•œ๋‹ค. ์Šคํƒ/ ํž™ ์˜ค๋ฒ„ํ”Œ๋กœ์šฐ๋Š” `๋ฒ”์œ„๋ฅผ ๋ฒ—์–ด๋‚œ ์“ฐ๊ธฐ`์ด๋ฏ€๋กœ out-of-bound read ์ทจ์•ฝ์ ๊ณผ๋Š” ๋‹ค๋ฅด๋‹ค. ๋‹ค๋งŒ ์ด ์ทจ์•ฝ์ ์€ `๋ฒ”์œ„๋ฅผ ๋ฒ—์–ด๋‚œ ์ฝ๊ธฐ`์ด๋ฏ€๋กœ, ๋ฉ”๋ชจ๋ฆฌ ๋‚ด์šฉ์ด ๋ณ€๊ฒฝ๋˜์ง€๋Š” ์•Š์ง€๋งŒ ์‹œ์Šคํ…œ์˜ ์ค‘์š”ํ•œ ์ •๋ณด (์•”ํ˜ธํ™” ํ‚ค, ๋ฉ”๋ชจ๋ฆฌ ์ฃผ์†Œ, ์ถ”๊ฐ€ ๊ณต๊ฒฉ์— ์‚ฌ์šฉํ•  ์ˆ˜ ์žˆ๋Š” ์ •๋ณด ๋“ฑ..)๋ฅผ ์–ป์„ ์ˆ˜ ์žˆ๋‹ค๋Š” ์œ„ํ—˜์ด ์žˆ๋‹ค.

     

     

     

     

    5. ์›๊ฒฉ ์ฝ”๋“œ ์‹คํ–‰ (RCE ์ทจ์•ฝ์ )

     

    ์•…์˜์ ์ธ TTF fonts๋ฅผ ์ฒ˜๋ฆฌํ•  ๋•Œ RCE ์ทจ์•ฝ์ ์ด ๋ฐœ์ƒํ•˜๊ธฐ๋„ ํ–ˆ๋‹ค. ์ƒ๊ฐ๋ณด๋‹ค ๋ทฐ์–ด ํ”„๋กœ๊ทธ๋žจ์ด ์ทจ์•ฝ์ ์— ๋งŽ์ด ๋…ธ์ถœ๋˜์–ด ์žˆ๋‚˜๋ณด๋‹ค.

     

    ๊ณต๊ฒฉ์ž๋กœ๋ถ€ํ„ฐ ์ „๋‹ฌ๋œ ์กฐ์ž‘๋œ ์œ„ํ—˜ PDF๋‚˜ ์ด๋ฏธ์ง€ ํŒŒ์ผ์„ ์—ด๋ฉด, ๊ณต๊ฒฉ์ž๊ฐ€ ์•…์„ฑ ์ฝ”๋“œ๋ฅผ ์›๊ฒฉ์œผ๋กœ ์‹คํ–‰ํ•  ์ˆ˜ ์žˆ๊ฒŒ ํ•˜๋Š” ์ทจ์•ฝ์ ์ด๋‹ค. ๊ณต๊ฒฉ์ž๊ฐ€ ํ”ผํ•ด์ž์˜ ์‹œ์Šคํ…œ์„ ์ œ์–ดํ•  ์ˆ˜ ์žˆ๊ฒŒ๋˜๊ฑฐ๋‚˜, ์ค‘์š” ๊ถŒํ•œ์„ ์–ป์„ ์ˆ˜ ์žˆ๋‹ค๋Š” ์œ„ํ—˜์ด ์กด์žฌํ•œ๋‹ค.

     

    https://www.datanet.co.kr/news/articleView.html?idxno=170550

    ์ด ๊ธฐ์‚ฌ๋ฅผ ํ™•์ธํ•ด๋ณด๋ฉด dompdf๋ผ๋Š” PDF ๋ณ€ํ™˜๊ธฐ์—์„œ๋„ ์•…์„ฑ font ๋ฐ์ดํ„ฐ์— ๋Œ€ํ•œ RCE ๋‚ด์šฉ์ด ๋‚˜ํƒ€๋‚œ๋‹ค. ๊ธ€๊ผด ์บ์‹œ ๋ฐ์ดํ„ฐ์— .php ํŒŒ์ผ ํ™•์žฅ์ž๋ฅผ ๊ฐ€์ง„ ์•…์„ฑ ๊ธ€๊ผด์„ ์ €์žฅํ•  ์ˆ˜ ์žˆ๋„๋ก ์†์—ฌ์„œ ์›๊ฒฉ ์ฝ”๋“œ๋ฅผ ์‹คํ–‰ํ•  ์ˆ˜ ์žˆ๋‹ค๋Š” ๋‚ด์šฉ์ด๋‹ค.

     

     

    6. ์ •์ˆ˜ ์˜ค๋ฒ„ํ”Œ๋กœ์šฐ ์ทจ์•ฝ์  (Integer Overflow)

    ์‚ฐ์ˆ  ์—ฐ์‚ฐ์„ ํ•  ๋•Œ ๋ณ€์ˆ˜๊ฐ€ ํŠน์ • ๋ฒ”์œ„๋ฅผ ์ดˆ๊ณผํ•˜๋ฉด ์˜ˆ์ƒํ•˜์ง€ ๋ชปํ•œ ๋ฐฉ์‹์œผ๋กœ ๋ทฐ์–ด๊ฐ€ ๋Œ์•„๊ฐ€๋Š” ๊ฒฝ์šฐ์— ๋‚˜ํƒ€๋‚˜๋Š” ์ทจ์•ฝ์ ์ด๋‹ค.

     

    ์˜ˆ๋ฅผ๋“ค๋ฉด 8๋น„ํŠธ ๋ถ€ํ˜ธ ์—†๋Š” ์ •์ˆ˜(unsigned)๋Š” 0๋ถ€ํ„ฐ 255๊นŒ์ง€์˜ ๊ฐ’์„ ๋‚˜ํƒ€๋‚ธ๋‹ค.

    ๊ทธ๋Ÿฐ๋ฐ ๋งŒ์•ฝ signed ๊ฐ’์ธ๋ฐ ์ตœ๋Œ€๊ฐ’์„ ๋„˜๊ฒจ๋ฒ„๋ฆฌ๋ฉด ์ •์ˆ˜ ์˜ค๋ฒ„ํ”Œ๋กœ์šฐ ์ทจ์•ฝ์ ์ด ๋ฐœ์ƒํ•˜๊ฒŒ ๋˜๊ณ , ๋ณ€์ˆ˜๋Š” ์ตœ๋Œ€๊ฐ’์œผ๋กœ ๋‹ค์‹œ ๋Œ์•„๊ฐ€๊ฑฐ๋‚˜ ์Œ์ˆ˜๊ฐ€ ๋˜์–ด๋ฒ„๋ฆด ๊ฒƒ์ด๋‹ค. ๋”ฐ๋ผ์„œ ์ฝ”๋“œ ํ๋ฆ„์€ ์›ํ•˜์ง€ ์•Š๋Š” ๋ฐฉ์‹์œผ๋กœ ํ˜๋Ÿฌ๊ฐˆ ๊ฒƒ์ด๊ณ , ๊ณต๊ฒฉ์ž๋Š” ์ด ์ทจ์•ฝ์ ์„ ์ด์šฉํ•ด ์ฝ”๋“œ์˜ ์‹คํ–‰์„ ์กฐ์ž‘ํ•  ์šฐ๋ ค๊ฐ€ ์ƒ๊ธฐ๋Š” ๊ฒƒ์ด๋‹ค.

     

     


     

     

     ์ทจ์•ฝํ•  ๊ฐ€๋Šฅ์„ฑ์ด ๋†’์€ PDF, ์ด๋ฏธ์ง€ ๋ทฐ์–ด ๊ณ ๋ ค ์‚ฌํ•ญ 

    1. ๋ณต์žก๋„๊ฐ€ ๋†’์€ ๋ทฐ์–ด

    ๋ณต์žกํ•˜๊ณ  ์ฝ”๋“œ๊ฐ€ ๊ธธ์ˆ˜๋ก ๋ฒ„๊ทธ๋‚˜ ์ทจ์•ฝ์ ์ด ์ƒ๊ธธ ์ˆ˜ ์žˆ๋Š” ๊ฐ€๋Šฅ์„ฑ์ด ๋†’์•„์ง„๋‹ค.

    ํŠนํžˆ ์ด๋ฏธ์ง€ ๋ทฐ์–ด๋ณด๋‹ค PDF ๋ทฐ์–ด๊ฐ€ ํ›จ์”ฌ ๋” ๋†’์€ ๋ณต์žก๋„๋ฅผ ๊ฐ€์ง€๊ณ  ์žˆ๋Š” ํŽธ์ด๋‹ค. (์™œ๋ƒํ•˜๋ฉด ๋ฌธ์„œ์—๋Š” ์ด๋ฏธ์ง€, ํ…์ŠคํŠธ, ํฐํŠธ, ๊ทธ ๋ฐ–์˜ ๋‹ค์–‘ํ•œ ์„œ๋ช…๋“ค์ด ๋“ค์–ด๊ฐ€๊ธฐ ๋•Œ๋ฌธ์— ์ด๋ฏธ์ง€๋ณด๋‹ค ํ›จ์”ฌ ๋” ๋งŽ์€ ๊ณ ๋ ค๋ฅผ ํ•ด์•ผํ•  ๊ฒƒ์ด๋‹ค.)

     

     

    2. ์™ธ๋ถ€ ํ”Œ๋Ÿฌ๊ทธ์ธ์ด๋‚˜ ํ™•์žฅ ๊ธฐ๋Šฅ, ๋ผ์ด๋ธŒ๋Ÿฌ๋ฆฌ ์‚ฌ์šฉ

    ํƒ€์‚ฌ์˜ ํ”Œ๋Ÿฌ๊ทธ์ธ์ด๋‚˜ ํ™•์žฅ ๊ธฐ๋Šฅ, ๋ผ์ด๋ธŒ๋Ÿฌ๋ฆฌ๋ฅผ ํ†ตํ•ด ์—ฐ๋™ํ•˜๋Š” ๋ทฐ์–ด๋Š” ์™ธ๋ถ€ ์—”์ง„์„ ์‚ฌ์šฉํ•œ๋‹ค. ์ด๋•Œ ํ˜ธํ™˜์„ฑ ๋ฉด์ด๋‚˜ ์™ธ๋ถ€์˜ ํ•ด๋‹น ์ž๋ฃŒ๊ฐ€ ์ทจ์•ฝํ•  ๊ฒฝ์šฐ ๋ทฐ์–ด์—๋„ ํ•ด๋‹น ์ทจ์•ฝ์ ์— ๋Œ€ํ•œ ์˜ํ–ฅ์ด ๊ฐˆ ์ˆ˜ ์žˆ๋‹ค. ํŠนํžˆ ๋ธŒ๋ผ์šฐ์ € ๊ธฐ๋ฐ˜ ๋ทฐ์–ด๋„ ํ•ด๋‹นํ•œ๋‹ค.

     

    3. ํŒจ์น˜๊ฐ€ ๋”๋”˜ ๋ทฐ์–ด

    ํ”ผ๋“œ๋ฐฑ์„ ์ฆ‰์‹œ ๋ฐ˜์˜ํ•˜์ง€ ์•Š๊ฑฐ๋‚˜ ํŒจ์น˜๊ฐ€ ์˜ค๋žœ ๊ธฐ๊ฐ„ ์ด๋ฃจ์–ด์ง€์ง€ ์•Š๋Š” ๋ทฐ์–ด์ผ ์ˆ˜๋ก ์ทจ์•ฝ์ ์— ๋…ธ์ถœ๋  ๊ฐ€๋Šฅ์„ฑ์ด ๋†’์•„์ง„๋‹ค.

    ์ƒ๋Œ€์ ์œผ๋กœ ํŒจ์น˜ ๊ทœ๋ชจ๊ฐ€ ์ ์€ ์†Œ๊ทœ๋ชจ ๊ธฐ์—… ํ˜น์€ ์˜คํ”ˆ ์†Œ์Šค ๊ธฐ๋ฐ˜์˜ ํ”„๋กœ๊ทธ๋žจ์€ ๋ฒ„๊ทธ์— ๋Œ€ํ•ด ๋…ธ์ถœ ์œ„ํ—˜์ด ์ฆ๊ฐ€ํ•  ๊ฒƒ์ด๋‹ค.

     

    4. JavaScript๋ฅผ ์ง€์›ํ•˜๋Š” ๋ทฐ์–ด

    ํŠน์ • pdf ๋ทฐ์–ด๋Š” pdf ๋ทฐ์–ด ์•ˆ์— ์žˆ๋Š” ์ž๋ฐ”์Šคํฌ๋ฆฝํŠธ ์ฝ”๋“œ๋ฅผ ์‹คํ–‰ํ•  ์ˆ˜ ์žˆ๋‹ค. ์ด ๊ธฐ๋Šฅ์ด ํฌํ•จ๋˜์–ด์žˆ๋Š” ๋ทฐ์–ด ์ทจ์•ฝ์ ์ด ์ž์ฃผ ๋ฐœ์ƒ๋˜๋Š” ํŽธ์ด๋‹ค. Buffer Overflow, Format String Vulnerability, Heap Spraying, XSS, Drive-by Download์™€ ๊ฐ™์€ ์ทจ์•ฝ์ ์ด ์ฃผ๋กœ ๋ฐœ์ƒํ•œ๋‹ค.

     

    ๊ณต๊ฒฉ์ž๋“ค์˜ ๊ณต๊ฒฉ ์›๋ฆฌ๋Š” pdf์— ์ž๋ฐ”์Šคํฌ๋ฆฝํŠธ๋ฅผ ๋‚ด์žฅํ•ด ์ทจ์•ฝํ•œ ๋ทฐ์–ด์—์„œ ์•…์„ฑ ์ฝ”๋“œ๋ฅผ ์‚ฌ์šฉ์ž๊ฐ€ ์‹คํ–‰ํ•˜๊ฒŒ ํ•˜๋Š” ๊ฒƒ์ด๋‹ค.

    ์›๋ž˜ ์ž๋ฐ”์Šคํฌ๋ฆฝํŠธ๋Š” ์–‘์‹์ด๋‚˜ ๋ฌธ์„œ ํ˜•์‹์„ ์ž…๋ ฅํ•˜๊ณ  ๊ฒ€์ฆํ•˜๊ฑฐ๋‚˜, ๋ฐ์ดํ„ฐ ์ „์†ก, ๋™์  ์ฝ˜ํ…์ธ  ์ž…๋ ฅ ๋“ฑ์˜ ์š”์†Œ๋ฅผ ํฌํ•จํ•  ์ˆ˜ ์žˆ๊ฒŒ ํ•ด์ค€๋‹ค. ๊ทธ๋Ÿฌ๋‚˜ ๋งŒ์•ฝ ์ด๋ฅผ ์•…์šฉํ•˜๋ฉด PDF ๋ฌธ์„œ ์ „์—ญ ๋ฒ”์œ„์— ์œ„์น˜ํ•˜๋Š” ์ž๋ฐ”์Šคํฌ๋ฆฝํŠธ๊ฐ€ ๋ฌธ์„œ๊ฐ€ ์—ด๋ฆด ๋•Œ ์ž๋™์œผ๋กœ ์‹คํ–‰๋˜๋Š” ์ ์„ ์ด์šฉํ•ด์„œ ๊ณต๊ฒฉ์ž๊ฐ€ ์•…์„ฑ ์Šคํฌ๋ฆฝํŠธ๋ฅผ ์ด์šฉํ•ด ๊ณต๊ฒฉ์„ ํ•  ์ˆ˜ ์žˆ๋‹ค.

     

    ์˜ˆ๋ฅผ๋“ค๋ฉด Slim Pdf ๋ทฐ์–ด๋‚˜ Sumatra PDF๊ณผ ๊ฐ™์€ ๋ทฐ์–ด๋Š” ๊ฐ€๋ณ๊ณ  ๋‹จ์ˆœํ•˜๊ธฐ ๋•Œ๋ฌธ์— ์ทจ์•ฝ์ ์˜ ๋นˆ๋„๊ฐ€ ๋‚ฎ์„ ๊ฒƒ์ด๋‹ค.

     


     Windows ๋Œ€ํ‘œ ๋ทฐ์–ด ํ”„๋กœ๊ทธ๋žจ ์•Œ์•„๋ณด๊ธฐ 

     

     ๐ŸŒ„๋Œ€ํ‘œ ์ด๋ฏธ์ง€ ๋ทฐ์–ด๋“ค (image viewer) 

    Windows ๊ธฐ๋ณธ ์‚ฌ์ง„ ์•ฑ (Microsoft ์‚ฌ์ง„)

    ๊ฐ€์žฅ ๊ธฐ๋ณธ์ ์ธ Winodws์˜ ์ด๋ฏธ์ง€ ๋ทฐ์–ด. ๋‹ค์–‘ํ•œ ์ด๋ฏธ์ง€ ํฌ๋งท ํŒŒ์ผ์„ ์ง€์›ํ•œ๋‹ค.

    ๊ธฐ๋ณธ์ ์œผ๋กœ ๋กœ์ปฌ ํŒŒ์ผ์— ์ €์žฅ๋œ ์ด๋ฏธ์ง€ ํŒŒ์ผ์„ ์—ด๊ธฐ๋•Œ๋ฌธ์— ์œ ์ถœ ๊ฐ€๋Šฅ์„ฑ์ด ์ ์ง€๋งŒ, ์ตœ๊ทผ Google Drive๋‚˜ OneDrive์™€ ๊ฐ™์€ ํด๋ผ์šฐ๋“œ๊ฐ€ ํ™œ์„ฑํ™”๋˜๊ณ  ์žˆ์œผ๋ฏ€๋กœ SSL, TLS ๋“ฑ์„ ํ†ตํ•ด ์•”ํ˜ธ๋ฅผ ๊ฐ•ํ™”ํ•˜๊ณ  ์žˆ๋‹ค.

     

    ํ•˜์ง€๋งŒ ๊ธฐ๋ณธ์ ์ธ ๊ธฐ๋Šฅ๋งŒ ์ œ๊ณตํ•˜๊ธฐ ๋•Œ๋ฌธ์— ์ „๋ฌธ์ ์ธ ์‚ฌ์ง„ ํŽธ์ง‘์„ ํ•˜๊ธฐ๋Š” ์–ด๋ ต๋‹ค.

     

    Microsoft Photos ๊ด€๋ จ ์ง€๋‚œ ์ทจ์•ฝ์ 

    CVE-2022-30168 : Remote code execution in Microsoft Photos App

    CVE-2023-28291 : Raw Image Extension Remote Code Execution Vulnerability

     

     

     

    IrfanView

     

    Windows ์šด์˜ ์ฒด์ œ์—์„œ ๋™์ž‘ํ•˜๋Š” ์ด๋ฏธ์ง€ ๋ทฐ์–ด๋กœ, ๊ฐ€๋ณ๋‹ค๋Š” (๊ฒฝ๋Ÿ‰ ๋ทฐ์–ด) ์žฅ์ ์„ ๊ฐ€์ง€๊ณ  ์žˆ๋‹ค.

    ํ”Œ๋Ÿฌ๊ทธ์ธ์„ ํ†ตํ•ด ์‚ฌ์šฉ์ž์—๊ฒŒ ๋งž์ถค ํ˜•์‹์œผ๋กœ ์ด๋ฏธ์ง€ ๋ทฐ์–ด์˜ ๊ธฐ๋Šฅ์„ ํ™•์žฅํ•  ์ˆ˜ ์žˆ๋‹ค.

     

    ๊ฐ€๋ณ๋‹ค๋Š” ๊ฒƒ์ด ๊ฐ€์žฅ ์žฅ์ ์ด๋ฉฐ ๋งŽ์€ ํฌ๋งท ์ด๋ฏธ์ง€ ํŒŒ์ผ์„ ์ฝ์„ ์ˆ˜ ์žˆ๋‹ค๋Š” ์‹ฌํ”Œํ•จ์ด ๊ฐ•์ ์ธ ๊ฒƒ ๊ฐ™๋‹ค.

     

    Infran View ๊ด€๋ จ CVE

    CVE-2024-6812 : rfanView WSQ File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability

    CVE-2023-24304 : Improper input validation in the PDF.dll plugin of IrfanView v4.60 allows attackers to execute arbitrary code via opening a crafted PDF file.

    CVE-2021-46064 : IrfanView 4.59 is vulnerable to buffer overflow via the function at address 0x413c70 (in 32bit version of the binary)

     

    https://www.cvedetails.com/vulnerability-list/vendor_id-317/Irfanview.html

     

    Irfanview : Security vulnerabilities, CVEs

    Security vulnerabilities related to Irfanview : List of vulnerabilities affecting any product of this vendor

    www.cvedetails.com

     

    ๊ฐ€์žฅ ์ตœ๊ทผ์ธ 2024๋…„๋„์— ๋ฒ”์œ„๋ฅผ ๋ฒ—์–ด๋‚œ ์ฝ๊ธฐ ์ทจ์•ฝ์ ์ด ๋ฐœ์ƒํ–ˆ๋‹ค. ๋˜ํ•œ ๋ฒ„ํผ ์˜ค๋ฒ„ํ”Œ๋กœ์šฐ ์ทจ์•ฝ์ ๋„ ๋ฐœ์ƒ๋œ ์ ์ด ์žˆ๋‹ค.

     

     

     

    XnView

    ๊ฐ€๋ณ๋‹ค๋Š” ์žฅ์ ์ด ์กด์žฌํ•˜์ง€๋งŒ ๊ฐœ์ธ์šฉ, ๊ต์œก์šฉ์œผ๋กœ๋Š” ๋ฌด๋ฃŒ๋กœ ์‚ฌ์šฉ์ด ๊ฐ€๋Šฅํ•˜๊ณ , ๊ทธ ์™ธ์˜ ์‚ฌ์šฉ์‹œ ๋ถ€๋ถ„ ์œ ๋ฃŒ๋‹ค.

    ํ•„์ž๋Š” ๋ฌด๋ฃŒ ๋ฒ„์ „์„ ๋‹ค์šด๋ฐ›์•˜๋Š”๋ฐ ์ผ๋ฐ˜ ๋ฒ„์ „์€ ์œ ๋‹ˆ์ฝ”๋“œ๋ฅผ ์ง€์›ํ•˜์ง€ ์•Š๋Š”๋‹ค๊ณ  ํ•œ๋‹ค.

    ์ฆ‰, ์œ ๋‹ˆ์ฝ”๋“œ์— ํ•œ์ž๋กœ ๋˜์–ด์žˆ๊ฑฐ๋‚˜ ํ•œ๋‹ค๋ฉด ์ž˜ ์ฝ์ง€ ๋ชปํ•˜๋Š” ๊ฒฝ์šฐ๊ฐ€ ์žˆ๋‹ค.

     

    ํ•˜์ง€๋งŒ ๊น”๋”ํ•œ ๋””์ž์ธ๊ณผ ๊ธฐ๋Šฅ์œผ๋กœ ๋งŽ์€ ์‚ฌ๋žŒ๋“ค์ด ์‚ฌ์šฉํ•˜๊ณ  ์žˆ๋Š” ๊ฒƒ ๊ฐ™๋‹ค.

    ์ด๋ฏธ์ง€ ๋กœ๋”ฉ ์†๋„๊ฐ€ ๋งค์šฐ ์ค€์ˆ˜ํ•˜๋ฉฐ, adobe psd ํŒŒ์ผ์ด๋‚˜ adobe ai ํŒŒ์ผ๋„ ์—ด ์ˆ˜ ์žˆ๋‹ค๋Š” ๋ง์„ ๋“ค์œผ๋‹ˆ ๋‚˜๋„ ๋‹น์žฅ ์‚ฌ์šฉํ•ด๋ณด๊ณ  ์‹ถ์–ด์กŒ๋‹ค.

     

    XnView ๊ด€๋ จ CVE

    CVE-2021-28835 : Buffer Overflow vulnerability in XNView before 2.50, allows local attackers to execute arbitrary code via crafted GEM bitmap file.

    CVE-2019-9967 : XnView Classic 2.48 on Windows allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted file, related to ntdll!RtlPrefixUnicodeString.

    CVE-2023-52174 : XnView Classic before 2.51.3 on Windows has a Write Access Violation at xnview.exe+0x3125D6.

     

     

    https://www.cvedetails.com/vulnerability-list/vendor_id-7902/Xnview.html

     

    Xnview : Security vulnerabilities, CVEs

    Security vulnerabilities related to Xnview : List of vulnerabilities affecting any product of this vendor

    www.cvedetails.com

     

     

    FastStone Image Viewer

    ๊ฐœ์ธ์€ ๋ฌผ๋ก  ๊ธฐ์—…/์ƒ์—…์  ์‚ฌ์šฉ๋„ ๋ฌด๋ฃŒ๋กœ ๊ฐ€๋Šฅํ•˜๋ฉฐ ๋‹ค์–‘ํ•œ ์ด๋ฏธ์ง€ ํ™•์žฅ์ž ํŒŒ์ผ์„ ์‹คํ–‰ํ•  ์ˆ˜ ์žˆ๋‹ค.

    DSLR๊ฐ™์€ ์นด๋ฉ”๋ผ๋ฅผ ์ด์šฉํ•œ ์ด๋ฏธ์ง€ ํ™•์žฅ์ž ํŒŒ์ผ์ด๋‚˜ Raw file (์ „๋ฌธ ์ด๋ฏธ์ง€ ํŒŒ์ผ) ๋˜ํ•œ ์ปจ๋ฒ„ํŒ…์ด ๊ฐ€๋Šฅํ•˜๋‹ค.

    ํŒŒ์ผ์— ์žˆ๋Š” ์‚ฌ์ง„๋“ค์„ ํ•œ๋ˆˆ์— ๋ฏธ๋ฆฌ๋ณด๊ธฐ๋กœ ํ™•์ธํ•  ์ˆ˜ ์žˆ์œผ๋ฉฐ ๊ฐ„๋‹จํ•œ ์ƒ‰๊ฐ ๋ณด์ •์ด๋‚˜ ์‚ฌ์ด์ฆˆ ์กฐ์ •๊ณผ ๊ฐ™์€ ๊ธฐ๋Šฅ์ด ์žˆ๋‹ค. ์ตœ๊ทผ์—๋Š” ์ž์ฒด ๋‚ด์žฅ ํ”Œ๋ ˆ์ด์–ด๋กœ ๋™์˜์ƒ ์žฌ์ƒ๋„ ๊ฐ€๋Šฅํ•˜๋‹ค. ์—ญ์‹œ๋‚˜ ๋งˆ์ฐฌ๊ฐ€์ง€๋กœ ๊ฐ€๋ณ๋‹ค๋Š” ์žฅ์ ์ด ์žˆ๋‹ค.

     

    FastStone Image Viewer ๊ด€๋ จ ์ง€๋‚œ ์ทจ์•ฝ์ 

    CVE-2022-36947 : Unsafe Parsing of a PNG tRNS chunk through 7.5 results in a stack buffer overflow

    CVE-2021-26237 : affected by a user mode write access violation at 0x00402d7d, triggered when a user opens or views a malformed CUR file that is mishandled by FSViewer.exe

    CVE-2021-26236 : FastStone Image Viewer v.<= 7.5 Stack-based Buffer Overflow

     

    ์ฃผ๋กœ 7.5 ์ดํ•˜์˜ ๋ฒ„์ „์—์„œ ๋‹ค์–‘ํ•œ ์ทจ์•ฝ์  ๋ฌธ์ œ๊ฐ€ ๋ฐœ์ƒํ•˜์˜€๋‹ค.

    https://www.opencve.io/cve?vendor=faststone

     

    Faststone CVE - OpenCVE

    CVE Vendors Products Updated CVSS v2 CVSS v3 Unsafe Parsing of a PNG tRNS chunk in FastStone Image Viewer through 7.5 results in a stack buffer overflow. FastStone Image Viewer <= 7.5 is affected by a user mode write access violation at 0x00402d7d, trigger

    www.opencve.io

     

     

    Honey View

    ๊ฟ€๋ทฐ๋ผ๊ณ  ์นญํ•˜๊ธฐ๋„ ํ•˜๋ฉฐ, ๋ฐ˜๋””์†Œํ”„ํŠธ์—์„œ ๋‚˜์˜จ ํ”„๋กœ๊ทธ๋žจ์ด๋‹ค.

    ์••์ถ•๋œ ์ด๋ฏธ์ง€ ํŒŒ์ผ์„ ์••์ถ• ํ•ด์ œ ์ „์— ๋ฏธ๋ฆฌ ํ™•์ธํ•ด๋ณด๊ณ  ์‹ถ์„ ๋•Œ ์‚ฌ์šฉ๋„๊ฐ€ ๋†’์€ ์ด๋ฏธ์ง€ ๋ทฐ์–ด์ด๋‹ค.

    ํŽธ์ง‘ ๊ธฐ๋Šฅ๋ณด๋‹ค๋Š” ์ด๋ฏธ์ง€ ๋ทฐ์–ด์˜ ์—ญํ• ์— ์ง‘์ค‘ํ•˜๊ณ  ์žˆ๋‹ค. ๋งŒํ™”๋‚˜ ๊ทธ๋ฆผ ์ž‘์—…ํ•˜๊ฑฐ๋‚˜ ๋ณด๋Š” ๋ถ„๋“ค์—๊ฒŒ ๋งŽ์ด ์‚ฌ์šฉ๋œ๋‹ค.

     

    Honey View ๊ด€๋ จ CVE

    CVE-2023-4863 : WebP ํฌ๋งท์—์„œ ๋ณด์•ˆ ์ทจ์•ฝ์  ๋ฐœ์ƒ

     

    https://en.bandisoft.com/honeyview/history/

     

    Honeyview - Version history, Changelog

     

    en.bandisoft.com

     

     

     

     

     

     


     ๐Ÿ“•๋Œ€ํ‘œ PDF ๋ทฐ์–ด๋“ค (PDF Viewer) 

    SumatraPDF

    ์•„๋ฌด๋ž˜๋„ Adobe PDF Reader ๊ณผ ๊ฐ™์€ ๋ฌด๊ฒ๊ณ  ๋ณต์žกํ•œ ํ”„๋กœ๊ทธ๋žจ์ผ ์ˆ˜๋ก ์ทจ์•ฝ์ ์ด ๋‚˜ํƒ€๋‚  ์ˆ˜ ์žˆ๋Š” ๊ฒฝ์šฐ์˜ ์ˆ˜๊ฐ€ ๋” ๋งŽ์•„์งˆ ์ˆ˜ ์žˆ๋‹ค๊ณ  ๋“ค์—ˆ๋‹ค. ๋”ฐ๋ผ์„œ Sumatra Viewer์€ ๊ต‰์žฅํžˆ ๋‹จ์ˆœํ•˜๊ณ  ๊ฐ€๋ฒผ์šด ๋ทฐ์–ด์— ์†ํ•œ๋‹ค.

     

    ํšจ์œจ์ ์ด ์ข‹๊ณ  ์‹ ์†ํ•˜๋ฉฐ, ์›น ๋ทฐ์–ด๋ณด๋‹ค ํ˜ธํ™˜์„ฑ์ด ์ข‹๋‹ค๋Š” ๊ฒƒ์ด ์ด ๋ทฐ์–ด์˜ ์žฅ์ ์ด๋‹ค.

     

    Sumatra ๊ด€๋ จ CVE

    CVE-2023-33802 : A buffer overflow in SumatraPDF Reader v3.4.6 allows attackers to cause a Denial of Service (DoS) via a crafted text file.

    CVE-2012-5340 : SumatraPDF 2.1.1/MuPDF 1.0 allows remote attackers to cause an Integer Overflow in the lex_number() function via a corrupt PDF file.

    CVE-2013-2830 : Use-after-free vulnerability in SumatraPDF Reader 2.x before 2.2.1 allows remote attackers to execute arbitrary code via a crafted PDF file.

     

    https://www.cvedetails.com/product/62114/Sumatrapdfreader-Sumatrapdf.html?vendor_id=21018

     

    Sumatrapdfreader Sumatrapdf : CVE security vulnerabilities, versions and detailed reports

    Sumatrapdfreader Sumatrapdf security vulnerabilities, exploits, metasploit modules, vulnerability statistics and list of versions

    www.cvedetails.com

     

     

     

     

    Adobe Acrobat

    ์•„๋งˆ ์•ˆ์จ๋ณธ ์‚ฌ๋žŒ์ด ์œ ๋ช…ํ•  ์ •๋„๋กœ ๋Œ€์ค‘์ ์ธ PDF ๋ทฐ์–ด์ด๋‹ค.

    ๊ฐœ์ธ, ๊ธฐ์—…, ์ƒ์—…์  ์ด์šฉ ๋“ฑ ๊ทธ ์“ฐ์ž„์— ๋”ฐ๋ผ ๋ฒ„์ „์ด Standard, Pro, Acrobat Reader๋กœ ๋‚˜๋‰˜์–ด์ ธ ์žˆ๋‹ค. ์ผ๋‹จ viewer์— ๋” ์ง‘์ค‘ํ•˜๊ณ ์žˆ๊ธฐ ๋•Œ๋ฌธ์— ํ•„์ž๋Š” Acrobat Reader์— ๋” ํ™œ๋™์„ ์ง‘์ค‘ํ•ด๋ณด๋ ค๊ณ  ํ•œ๋‹ค.

     

    ๋ณด์•ˆ์„ ์œ„ํ•œ ์ „์ž ์„œ๋ช…์„ ํ†ตํ•ด ๋ฌธ์„œ ์œ„์กฐ๋‚˜ ๋ณ€์กฐ๋ฅผ ๋ฐฉ์ง€ํ•˜๋Š” ์ค‘์š”ํ•œ ๊ธฐ๋Šฅ์„ ๊ฐ€์ง€๊ณ  ์žˆ๋‹ค.

    ๋˜ํ•œ ๋‹ค์–‘ํ•œ PDF ๊ด€๋ จ ํ”Œ๋Ÿฌ๊ทธ์ธ์„ ์ง€์›ํ•ด ํ•„์š”ํ•œ ๋ถ€๋ถ„์— ๋งˆํฌํ•˜๊ฑฐ๋‚˜ ํ•˜์ด๋ผ์ดํŠธํ•˜๋Š” ํ–‰๋™์„ ํ•   ์ˆ˜ ์žˆ๋‹ค.

    pdf๋ฅผ ๋ณ‘ํ•ฉํ•˜๋Š” ํˆด๋„ ์‚ฌ์šฉํ•ด๋ณธ ์ ์ด ์žˆ๊ณ , ๊ธฐ๋Šฅ์ด ๋‹ค์–‘ํ•œ ๋งŒํผ ํ™œ์šฉ๋„๊ฐ€ ๋งค์šฐ ๋†’๋‹ค.

     

    Adobe Acrobat Reader ๊ด€๋ จ CVE

    CVE-2024-30310 : Acrobat Reader versions 20.005.30574, 24.002.20736 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user.

    CVE-2024-20730 : Acrobat Reader versions 20.005.30539, 23.008.20470 and earlier are affected by an Integer Overflow or Wraparound vulnerability that could result in arbitrary code execution in the context of the current user.

    CVE-2023-38243 : Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by a Use-After-Free vulnerability that could lead to disclosure of sensitive memory.

     

    Use After Free (UAF) ์ทจ์•ฝ์  : Heap์€ ๋™์  ํ• ๋‹น์˜ ๊ตฌ๊ฐ„์ธ๋ฐ, ๋™์  ํ• ๋‹น์„ ์ด์šฉํ•ด Heap๋ฅผ ์‚ฌ์šฉํ•˜๊ณ  Free๋ฅผ ํ†ตํ•ด ์žฌ์‚ฌ์šฉํ•  ๊ฒฝ์šฐ ํ•ด๋‹น ์ทจ์•ฝ์ ์ด ๋‚˜ํƒ€๋‚œ๋‹ค. ํฌ์ธํ„ฐ๋ฅผ ์ ์ ˆํ•˜๊ฒŒ ์ดˆ๊ธฐํ™”ํ•˜์ง€ ์•Š์•„ Heap ์˜์—ญ์„ ์ž˜๋ชป ๋‹ค๋ฃจ๊ฒŒ ๋œ๋‹ค๋ฉด ํ•ด๋‹น ๋‚˜ํƒ€๋‚˜๋Š” ๋ฌธ์ œ์ด๋‹ค.

     

    https://www.cvedetails.com/vulnerability-list/vendor_id-53/product_id-497/Adobe-Acrobat-Reader.html

     

    Adobe Acrobat Reader : Security vulnerabilities, CVEs

    Security vulnerabilities of Adobe Acrobat Reader : List of vulnerabilities affecting any version of this product

    www.cvedetails.com

     

     

     

     

    PDF-XChange Editor

    ๊ต‰์žฅํžˆ ๋‹ค์–‘ํ•œ ๊ธฐ๋Šฅ์ด ์žˆ๋Š” ๋ทฐ์–ด๋กœ์„œ, ์ดˆ๋ณด์ž๋ถ€ํ„ฐ ์ „๋ฌธ๊ฐ€๊นŒ์ง€ ๋„“์€ ๋ฒ”์œ„์˜ ์ŠคํŽ™ํŠธ๋Ÿผ์œผ๋กœ ์‚ฌ์šฉ์ด ๊ฐ€๋Šฅํ•˜๋‹ค.

    ๋ทฐ์–ด ์ด๋ฏธ์ง€๋ฅผ ํ™•์ธํ•ด๋ณด๋ฉด ๋ฌธ์„œ ํŽ˜์ด์ง€ ๊ต์ฒด, ์‚ญ์ œ, ์ˆ˜์ • ๋“ฑ์˜ ์—ฌ๋Ÿฌ๊ฐ€์ง€ ๊ธฐ๋Šฅ๋“ค์ด ํฌํ•จ๋˜์–ด์žˆ๋Š” ๊ฒƒ์„ ํ™•์ธํ•  ์ˆ˜ ์žˆ๋‹ค.

    pdf ๋ฌธ์„œ๋ฅผ ๋‹ค์–‘ํ•œ ํ™•์žฅ์ž ํŒŒ์ผ๋กœ ๋ณ€๊ฒฝํ•  ์ˆ˜ ์žˆ์œผ๋ฉฐ, ์ฃผ์„๊ณผ ๋จธ๋ฆฌ๊ธ€/๋ฐ”๋‹ฅ๊ธ€ ์ถ”๊ฐ€ ๋“ฑ์˜ ๊ธฐ๋Šฅ์ด ์กด์žฌํ•œ๋‹ค.

     

    250๊ฐœ ์ด์ƒ์˜ ๊ธฐ๋Šฅ์ด ์กด์žฌํ•œ๋‹ค๊ณ  ํ•˜๋‹ˆ ์ด ๊ธ€์—์„œ ๋ชจ๋‘ ๋‹ด๊ธฐ๋Š” ์–ด๋ ค์šธ ์ •๋„์ผ ๊ฒƒ ๊ฐ™๋‹ค.

    ํŽธ์ง‘์— ๋งŽ์ด ํŠนํ™”๋œ ๋ทฐ์–ด๋ผ๋Š” ์ƒ๊ฐ์ด ๋“ค์—ˆ๋‹ค.

     

    PDF-XChange Editor ๊ด€๋ จ CVE

    CVE-2024-27327 : PDF-XChange Editor PDF File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability.

    CVE-2024-27323 : PDF-XChange Editor Updater Improper Certificate Validation Remote Code Execution Vulnerability.

    CVE-2023-42111 : PDF-XChange Editor JPG File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability.

     

     

     

    https://www.cvedetails.com/vulnerability-list/vendor_id-12248/product_id-50038/Tracker-software-Pdf-xchange-Editor.html

     

    Tracker-software Pdf-xchange Editor : Security vulnerabilities, CVEs

    Security vulnerabilities of Tracker-software Pdf-xchange Editor : List of vulnerabilities affecting any version of this product

    www.cvedetails.com

     

     

     

     

     

     

    ์•ŒPDF

    ๊ตญ์‚ฐ PDF ๋ทฐ์–ด์ด๋‹ค. ์ผ๋‹จ ์ฃผ์š” ๊ธฐ๋Šฅ์œผ๋กœ๋Š” PDF์˜ ๋‹ค์–‘ํ•œ ํฌ๋งท ๋ณ€๊ฒฝ, ์ž์œ ๋กœ์šด ํŽธ์ง‘, ๋‹ค์–‘ํ•œ ๋งˆํฌ๋ฅผ ํ†ตํ•œ ๋ฌธ์„œ ๊ฒ€ํ† , ๊ทธ๋ฆฌ๊ณ  ๊ถŒํ•œ ์•”ํ˜ธ์ด๋‹ค. ๋ณด์•ˆํ•™๋„์ž„์— ๊ถŒํ•œ ์•”ํ˜ธ๋ผ๋Š” ๋ช…์นญ์ด ๊ถ๊ธˆํ–ˆ๋Š”๋ฐ, ๋ฌธ์„œ์— ์•”ํ˜ธ๋ฅผ ๊ฑธ์–ด ๋‹ค์–‘ํ•˜๊ฒŒ ํŽธ์ง‘์ด ์–ด๋А์ •๋„๊นŒ์ง€ ๊ฐ€๋Šฅํ•˜๊ฒŒ ํ• ์ง€ ์ˆ˜์ค€ ์ •๋„๋ฅผ ์ง์ ‘ ๊ฒฐ์ •ํ•  ์ˆ˜๊ฐ€ ์žˆ๋‹ค. ์ด๋Ÿฐ ๊ธฐ๋Šฅ์ด ์žˆ๋‹ค๋Š”๊ฒŒ ์กฐ๊ธˆ ์‹ ๊ธฐํ–ˆ๋‹ค.

     

    ๋ณด์•ˆ ๊ด€๋ จ ๊ธฐ์—…์—์„œ ๋‚˜์˜จ PDF ๋ทฐ์–ด๋ผ ๋ณด์•ˆ ์„ฑ๋Šฅ์ด ์ข‹์„ ๊ฒƒ์œผ๋กœ ์˜ˆ์ƒ๋œ๋‹ค.

     

     

    Slim PDF Reader

     

    ํŽธ์ง‘๋ณด๋‹ค๋Š” ๋ณด๊ธฐ ๊ธฐ๋Šฅ์„ ์ œ๊ณตํ•˜๋Š” ๊ฒƒ์— ์ง‘์ค‘ํ•œ ๋ทฐ์–ด์ด๋‹ค. Slim ์ด๋ผ๋Š” ์ด๋ฆ„์— ๊ฑธ๋งž๊ฒŒ ๋ทฐ์–ด์˜ ์‹œ์Šคํ…œ ํŒŒ์ผ ์ž์ฒด๋„ ๋งค์šฐ ์ž‘์€ ์šฉ๋Ÿ‰์— ๋ถˆ๊ณผํ•˜๊ณ , ๋งค์šฐ ์‹ ์†ํ•œ ๊ตฌ๋™ ์†๋„๋ฅผ ์ž๋ž‘ํ•œ๋‹ค. ์ •๋ง ๋ถ€๋‹ด ์—†์ด ์„ค์น˜ํ•  ์ˆ˜ ์žˆ๋Š” ๋ทฐ์–ด๋‹ค.

     

    Slim PDF Reader ๊ด€๋ จ CVE

    CVE-2011-4220 : Slim PDF Reader version 1.0 suffers from a denial of service vulnerability.

     

    ์ด ์™ธ์˜ CVE๋Š” ํŠน๋ณ„์ด ์—†์–ด๋ณด์ธ๋‹ค. ๋‹จ์ˆœํ•œ ๊ตฌ์„ฑ์˜ ํ”„๋กœ๊ทธ๋žจ์ผ์ˆ˜๋ก ์ทจ์•ฝ์ ์ด ๋‚˜ํƒ€๋‚˜๋Š” ๋นˆ๋„๊ฐ€ ์ ์—ˆ๋‹ค.

     

     

     

    Foxit PDF Reader

    Windows ๋ฟ๋งŒ ์•„๋‹ˆ๋ผ iOS, Android, ๋ฆฌ๋ˆ…์Šค ๋“ฑ์˜ ๋‹ค์–‘ํ•œ OS ํ™˜๊ฒฝ์—์„œ ํ”„๋กœ๊ทธ๋žจ์„ ์ง€์›ํ•œ๋‹ค.

    PDF ํŒŒ์ผ์— ๋Œ“๊ธ€์„ ๋‹ฌ๊ฑฐ๋‚˜, ์ฃผ์„์„ ํ†ตํ•ด ํ˜‘์—…์„ ํ•˜๊ธฐ์— ์ ํ•ฉํ•ด IT๋‚˜ ๋‹ค๋ฅธ ๊ธฐ์—…์—์„œ ์‚ฌ๋ž‘๋ฐ›๊ณ  ์žˆ๋‹ค.

    ๊ทธ ์™ธ์—๋„ AI Assistant, ์„œ๋ช…, ํ˜ธํ™˜์„ฑ ๊ธฐ๋Šฅ ๋ฉด์—์„œ๋„ ์šฐ์ˆ˜ํ•˜๋‹ˆ ๊ต‰์žฅํžˆ ํ˜„๋Œ€์ ์ธ PDF ๋ทฐ์–ด์ธ ๊ฒƒ ๊ฐ™๋‹ค.

    ์ด๋ฒˆ ๊ธ€์„ ํ†ตํ•ด ๋ทฐ์–ด๋ฅผ ๋งŽ์ด ์•Œ๊ณ  ๊ฐ„๋‹ค..

     

    Foxit Reader ๊ด€๋ จ CVE

     

    ์ด ํ‘œ๋ฅผ ํ†ตํ•ด PDF Viewer์—์„œ Overflow, Memory Corruption, sql injection, xss, File inclusion ... ๋“ฑ์˜ ์ทจ์•ฝ์ ์ด ๋‚˜ํƒ€๋‚˜๊ณ , ๊ทธ ๋นˆ๋„๊ฐ€ ์ฃผ๋กœ Overflow๋‚˜ Memory Corruption ์ทจ์•ฝ์ ์— ํ•ด๋‹นํ•œ๋‹ค๋Š” ์‚ฌ์‹ค์„ ์•Œ ์ˆ˜ ์žˆ๊ฒ ๋‹ค.

     

    CVE-2018-14295 : allows remote attackers to execute arbitrary code on vulnerable installations of Foxit PhantomPDF Phantom PDF 9.1.5096

    CVE-2018-3924 : An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's Foxit PDF Reader version 9.1.5096.

     

    ํ™•์ธํ•ด๋ณด๋‹ˆ Foxit Reader์—์„œ๋Š” ์ž„์˜์˜ ์ฝ”๋“œ๊ฐ€ ์‹คํ–‰๋  ์ˆ˜ ์žˆ๋Š” ์ทจ์•ฝ์ ์ด ์ƒ๋‹นํžˆ ๋‹ค์ˆ˜ ๋ฐœ์ƒํ•˜์˜€๋‹ค.

    https://www.cvedetails.com/product/16993/Foxitsoftware-Foxit-Reader.html?vendor_id=7654

     

    Foxitsoftware Foxit Reader : CVE security vulnerabilities, versions and detailed reports

    Foxitsoftware Foxit Reader security vulnerabilities, exploits, metasploit modules, vulnerability statistics and list of versions

    www.cvedetails.com

     

     

     

     

     

    Google Chrome (์›น pdf ๋ทฐ์–ด)

    ์›น ๋ธŒ๋ผ์šฐ์ €๋กœ ์ง€์›ํ•˜๋Š” pdf ๋ทฐ์–ด์˜ ์ผ์ข…์ด๋‹ค. Google Chrome ๋ง๊ณ ๋„ ๋‹ค์–‘ํ•œ ๋ธŒ๋ผ์šฐ์ €๊ฐ€ pdf ๋ทฐ์–ด๋ฅผ ์ง€์›ํ•œ๋‹ค.

    ์›น์—์„œ ๋‹ค์šด๋ฐ›์€ PDF ํŒŒ์ผ์„ ์ฆ‰์‹œ ๋น ๋ฅด๊ฒŒ ํ™•์ธํ•˜๊ณ  ์‹ถ์„ ๋•Œ ๊ฐ€์žฅ ๋งŽ์ด ์‚ฌ์šฉํ•˜๋Š” ๋ทฐ์–ด์ด๋ฉฐ, ํŽธ์ง‘๊ณผ ๊ฐ™์€ ๊ธฐ๋Šฅ์€ ๊ธฐ๋ณธ์ ์œผ๋กœ ์ œ๊ณตํ•˜๊ณ ์žˆ์ง€ ์•Š์ง€๋งŒ ์ธ์‡„๊ธฐ๋Šฅ์„ ์‚ฌ์šฉํ•˜๊ฑฐ๋‚˜ ๊ณต์œ ๊ธฐ๋Šฅ์„ ์‚ฌ์šฉํ•  ๋•Œ ๋งค์šฐ ์œ ์šฉํ•˜๋‹ค. ์•„๋งˆ ๋‹น์‹ ๋˜ํ•œ ํ‰์†Œ์—๋„ ์ •๋ง ํ”ํ•˜๊ฒŒ ์‚ฌ์šฉํ•˜๊ณ  ์žˆ์„ ๊ฒƒ์ด๋‹ค.

     

    ์ •๋ง ์‹ ๊ธฐํ•œ๊ฒŒ ์ด๋Ÿฐ ์›น ๋ธŒ๋ผ์šฐ์ €์—์„œ๋„ ์ทจ์•ฝ์ ์€ ์ž์ฃผ ๋‚˜ํƒ€๋‚ฌ๋‹ค. ์›น ๋ธŒ๋ผ์šฐ์ €๋„ PDF ๋ทฐ์–ด์˜ ์ทจ์•ฝ์ ์„ ํ”ผํ•ด๊ฐˆ ์ˆ˜ ์—†๋‹ค๋Š” ๋œป์ด๋‹ค.

     

    Google Chrome PDF Reader ๊ด€๋ จ CVE

    CVE-2023-2931 : Affected by this issue is an unknown code block of the component PDF. The manipulation with an unknown input leads to a use after free vulnerability.

    CVE-2012-2862 : An unspecified use-after-free error exists in the PDF viewer

    CVE-2012-2863 : An unspecified out-of-bounds write error exists in the PDF viewer.

    CVE-2023-1530 : Use after free in PDF in Google Chrome prior to 111.0.5563.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

     

     

     

     

    ๋Œ“๊ธ€