<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PDF exploit evasion(33939) in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/pdf-exploit-evasion-33939/m-p/4513#M3334</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN&gt;When you login to &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://support.paloaltonetworks.com/"&gt;https://support.paloaltonetworks.com/&lt;/A&gt;&lt;SPAN&gt; click on "Threat Database" in "Find Answers" (to the left or the right).&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the search box type "33939" (without the quotes), make sure "vulnerability" (for this case) is selected in "type" and finally click on the Find-button.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However... doing the above will only bring you the obvious:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"&lt;BR /&gt;Detail&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Attack Name&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; PDF Exploit Evasion Found&lt;BR /&gt;Description&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; This alert indicates that PDF exploit evasion has been found on your network.&lt;BR /&gt;Threat ID&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 33939&lt;BR /&gt;Severity&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;informational&lt;BR /&gt;Category&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; info-leak&lt;BR /&gt;"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So ehm... anyone else with ideas? &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 17 Mar 2012 11:21:50 GMT</pubDate>
    <dc:creator>mikand</dc:creator>
    <dc:date>2012-03-17T11:21:50Z</dc:date>
    <item>
      <title>PDF exploit evasion(33939)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pdf-exploit-evasion-33939/m-p/4512#M3333</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dear all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Our device warned us of pdf exploit evasion. (id:33939)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But, no information on that.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please give me information.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards&lt;/P&gt;&lt;P&gt;tomohiro&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 17 Mar 2012 06:37:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pdf-exploit-evasion-33939/m-p/4512#M3333</guid>
      <dc:creator>tomohiro.sanematsu</dc:creator>
      <dc:date>2012-03-17T06:37:59Z</dc:date>
    </item>
    <item>
      <title>Re: PDF exploit evasion(33939)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pdf-exploit-evasion-33939/m-p/4513#M3334</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN&gt;When you login to &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://support.paloaltonetworks.com/"&gt;https://support.paloaltonetworks.com/&lt;/A&gt;&lt;SPAN&gt; click on "Threat Database" in "Find Answers" (to the left or the right).&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the search box type "33939" (without the quotes), make sure "vulnerability" (for this case) is selected in "type" and finally click on the Find-button.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However... doing the above will only bring you the obvious:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"&lt;BR /&gt;Detail&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Attack Name&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; PDF Exploit Evasion Found&lt;BR /&gt;Description&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; This alert indicates that PDF exploit evasion has been found on your network.&lt;BR /&gt;Threat ID&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 33939&lt;BR /&gt;Severity&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;informational&lt;BR /&gt;Category&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; info-leak&lt;BR /&gt;"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So ehm... anyone else with ideas? &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 17 Mar 2012 11:21:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pdf-exploit-evasion-33939/m-p/4513#M3334</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2012-03-17T11:21:50Z</dc:date>
    </item>
    <item>
      <title>Re: PDF exploit evasion(33939)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pdf-exploit-evasion-33939/m-p/4514#M3335</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Tomohiro,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This signature is looking for use of double- and triple-encoded data within PDFs.&amp;nbsp; This is a commen evasion technique that malicious PDFs use to hide their malicious payload.&amp;nbsp; However, legimate PDFs can sometimes use double- (and perhaps triple-) encoded data as well, and so this signature is rated as "informational".&amp;nbsp; In fact, some PDF reports generated by the Palo Alto Networks firewalls can trigger this informational signature.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This signature, just like any other informational signature, is not the highest priority and should not necessarily trigger immediate alarm, however keeping an eye on instances of this alert for PDFs from untrusted sources is a good idea.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 Mar 2012 17:22:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pdf-exploit-evasion-33939/m-p/4514#M3335</guid>
      <dc:creator>tettema</dc:creator>
      <dc:date>2012-03-19T17:22:26Z</dc:date>
    </item>
    <item>
      <title>Re: PDF exploit evasion(33939)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pdf-exploit-evasion-33939/m-p/4515#M3336</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, tettema&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for your explanation. I understood this sigunagure.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards,&lt;/P&gt;&lt;P&gt;Tomohiro&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Mar 2012 03:55:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pdf-exploit-evasion-33939/m-p/4515#M3336</guid>
      <dc:creator>tomohiro.sanematsu</dc:creator>
      <dc:date>2012-03-21T03:55:29Z</dc:date>
    </item>
  </channel>
</rss>

