Adobe certification revocation for October 4th
Yesterday Adobe came out in a bog post stating an "inappropriate use of an Adobe code signing certificate for Windows".
Apparently they discovered a "compromised build server with access to Adobe code signing infrastructure". (Which is corporate speak for "one of our servers was hacked".) They "immediately decommissioned the existing Adobe code signing infrastructure and initiated a forensics investigation to determine how these signatures were created".
This apparently only effects "the Windows platform" and "three Adobe AIR applications for both Windows and Macintosh". I found a list of the applications involved, and how to update them on this page: http://helpx.adobe.com/x-productkb/global/certificate-updates.html. This update revocation will not occur until the 4th of October. (Next Thursday).
The interesting section (to me at least) of this post is the middle section:
We have identified a compromised build server that required access to the code signing service as part of the build process. Although the details of the machine’s configuration were not to Adobe corporate standards for a build server, this was not caught during the normal provisioning process. We are investigating why our code signing access provisioning process in this case failed to identify these deficiencies. The compromised build server did not have rights to any public key infrastructure (PKI) functions other than the ability to make code signing requests to the code signing service.
Our forensic investigation is ongoing. To date we have identified malware on the build server and the likely mechanism used to first gain access to the build server. We also have forensic evidence linking the build server to the signing of the malicious utilities. We can confirm that the private key required for generating valid digital signatures was not extracted from the HSM. We believe the threat actors established a foothold on a different Adobe machine and then leveraged standard advanced persistent threat (APT) tactics to gain access to the build server and request signatures for the malicious utilities from the code signing service via the standard protocol used for valid Adobe software.
The build server used a dedicated account to access source code required for the build. This account had access to only one product. The build server had no access to Adobe source code for any other products and specifically did not have access to any of Adobe’s ubiquitous desktop runtimes such as Flash Player, Adobe Reader, Shockwave Player, or Adobe AIR. We have reviewed every commit made to the source repository the machine did have access to and confirmed that no source code changes or code insertions were made by the build server account. There is no evidence to date that any source code was stolen.
Naturally people are writing in to us asking what this impacts (see the first link above) and what happened, (the second link above). But there is one thing we are sure of, we don't know the extent of the damage, and hope there was nothing more compromised than what Adobe has found in their investigation. I know Brad Arkin and trust him, so I don't have any reason to doubt him and his team (who are very good, and work very hard by the way, I don't want anyone to get the wrong impression), but "you never know", I guess, is my point.
Since I work for an IDS vendor, (Sourcefire, in the interest of full disclosure), our customers were very interested in the rules we released yesterday to cover this. So this is definitely on people's minds.
-- Joel Esler | http://blog.joelesler.net | http://twitter.com/joelesler
Comments
Ken
Sep 28th 2012
1 decade ago
Reading between the lines it sounds like Adobe is saying if you allow automatic updating you'll be fine. Otherwise you won't.
So what happens when the certificate is revoked? Do you just get a warning when you try to install an old version? Or do all of your users get a warning when they try to run Adobe Reader or use Flash? The latter would really suck.
JJ
Sep 28th 2012
1 decade ago
Joel
Sep 28th 2012
1 decade ago
- Ben Franklin
(... unless you're in marketing.)
.
PC.Tech
Sep 28th 2012
1 decade ago
Bob Stangarone
Sep 29th 2012
1 decade ago
Sep 28, 2012 - "... the issue appears to have been the result of hackers compromising a vulnerable build server. -Malware- seen using the digital signature includes pwdump7 v 7.1 (a utility that scoops up password hashes, and is sometimes used as a single file that statically links the OpenSSL library libeay32.dll). According to Adobe, the second malicious utility is myGeeksmail.dll, a malicious ISAPI filter..."
.
PC.Tech
Sep 29th 2012
1 decade ago
A: Because the one that was signed had been modified somehow. Or perhaps anti-malware products will ignore digitally signed files.
Anyway, that is my take. No one has said what those two files are doing malware-wise. Adobe has the samples. They need to tell us what they were doing.
If a security company was using them in pen tests, this could be seriously bad.
JJ
Sep 29th 2012
1 decade ago
Such a "older file" can be obtained from, for example, http://helpx.adobe.com/flash-player/kb/archived-flash-player-versions.html
I just downloaded the Flas player archive "(Released 6/21/2012) Flash Player 11.3.300.262 (35.1 MB)" (file: fp_11.3.300.262_archive.zip). All three executables in zip/fp_11.3.300.262_archive/11_3r300_262/ are signed with the certificate that will be revoked (Serial Nr. 15 e5 ac 0a 48 70 63 71 8e 39 da 52 30 1a 04 88).
@Bob Stangarone: what you describe has nothing to do with the issue at hand. No certificate has been revoked yet.
The interesting section (to me at least) of http://blogs.adobe.com/asset/2012/09/inappropriate-use-of-adobe-code-signing-certificate.html is:
"Our internal testing indicates that moving the impacted Adobe certificate to the Windows Untrusted Certificate Store does not block threat actors from executing the malicious utilities on a victim machine."
Unfortunately this is correct. By default Windows (at least XP) does not check digitally signed binaries when you expect them to do that. Even an exe file just downloaded, and hence tagged as "blocked" (using an Alternate Data Stream), does not have it's signature checked when you first run it.
Erik van Straten
Sep 30th 2012
1 decade ago
kevinm
Oct 2nd 2012
1 decade ago
http://blog.didierstevens.com/2012/10/01/searching-for-that-adobe-cert/
Didier Stevens
Oct 2nd 2012
1 decade ago