• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
tool that scans office software for vulnerabilities finds almost 100

Tool that scans office software for vulnerabilities finds almost 100 in Word and Acrobat

You are here: Home / General Cyber Security News / Tool that scans office software for vulnerabilities finds almost 100 in Word and Acrobat
May 13, 2022

Shutterstock

Security scientists have designed a resource to scan common office environment application for security vulnerabilities, and have previously found far more than 100 vulnerabilities throughout Microsoft Term, Adobe Acrobat and Foxit Reader.

The device, recognised as Cooper, ways vulnerability scanning by wanting at the way in which office software package integrates programming languages like JavaScript and Python to conduct automatic features such as file manipulation.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


The investigation co-authored by Peng Xu, Yanhao Wang, Hong Hu, and Purui Su from the School of Cyber Security at the College of Chinese Academy of Sciences, introduced the tool and highlights vulnerabilities prompted by the conversation of substantial and reduced-level languages.

In a investigation paper detailing the Cooper instrument, the researchers mentioned a ‘binding layer’ is needed to fundamentally translate the script’s steps, written in the significant-degree languages this sort of as JavaScript and Python, into code that can be interpreted by minimal-amount languages (C/C++) made use of to put into action the script’s steps into the computer software by itself.

This binding layer is susceptible to producing inconsistent representations of the scripts and can sometimes also forget about essential security checks, major to “severe security vulnerabilities” being located in the software package.

Immediately after running Cooper on Adobe Acrobat, Microsoft Term, and Foxit Reader, the scientists were capable to come across a full of 134 novel bugs – 60 for Adobe Acrobat, 56 in Foxit Reader, and 18 in Microsoft Term.

Most of the bugs identified by Cooper as part of the investigate (103) have been confirmed and 59 of them have been preset previously, netting the researchers $22,000 in bug bounties.

A full of 33 CVEs (official, trackable vulnerability codes) have been issued too, which includes CVE-2021-21028 and CVE-2021-21035 – a pair of bugs in Adobe Acrobat each individual with an 8.8 score on the CVSSv3 severity scale.

The scientists applied fuzzing to test for vulnerabilities in the programmes – a approach frequently made use of in such investigation and requires randomly creating a big quantity of inputs which are fed into the programme to emphasize behavioural anomalies, the scientists explained. 

There had been limitations to utilizing the technique, and the researchers formulated “novel techniques”: object clustering, statistical romance inference, and connection-guided mutation to handle these.

The limitations of fuzzing lie in the way in which it explores the mutation of code. Fuzzing is just one-dimensional, in that it modifies statements from the significant-stage code only, but binding statements receives inputs from two dimensions – the higher-amount code in the scripts and the very low-amount code in the underlying technique.

This restriction indicates each bug in the binding code cannot be found out in just a person dimension.

This was evidenced by the researchers who utilized the current Domato JavaScript fuzzer in the experiment also, which found markedly fewer bugs that Cooper.

The scientists plan to release the open up source code for Cooper by way of their GitHub web site so the group can aid build it out and even more boost the security of binding levels.


Some sections of this report are sourced from:
www.itpro.co.uk

Previous Post: «Cyber Security News Ukrainian Gets Four Years for Brute Forcing Thousands of Credentials
Next Post: Threat Actors Use Telegram to Spread ‘Eternity’ Malware-as-a-Service threat actors use telegram to spread ‘eternity’ malware as a service»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]
  • GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections

Copyright © TheCyberSecurity.News, All Rights Reserved.