-----BEGIN PGP SIGNED MESSAGE----- Hash: MD5 Product Vulnerability Reporting Form CONTACT INFORMATION =============================================================================== Name : Vladimir Katalov E-mail : info@elcomsoft.com Phone / fax : +7 095 216-7937 +1 866 448-2703 (fax; US, toll-free) Affiliation and address: 2-171 generala Antonova st. Moscow 117279 Russia Have you reported this to the vendor? Yes (the vendor has not replied). TECHNICAL INFO =============================================================================== Details on the vulnerability - ---------------------------- An eBook (electronic book) is simply a file that contains text and images - as in usual (printed) book, but with additional features such as hyperlinks (cross-references), searching capabilities and sometimes sounds/music. To read an eBook, you should have a PC with an appropriate software, or a special hardware device. Adobe Content Server (http://www.adobe.com/products/contentserver/) makes it easy for you to sell electronic books (eBooks) securely online. Adobe Content Server packages and protects eBooks and distributes them in PDF format directly from any Web site. Anyone with the free Adobe Acrobat eBook Reader (http://www.adobe.com/products/ebookreader/) can purchase your content with ease. That technology allows to enable or disable the following consumer permissions: copy text to clipboard, print all or a defined number of pages, lending, expiration, and text to speech. When the file is encrypted, special master voucher for its distribution is being created. The master voucher is a separate, XML-based file that contains an encrypted key to the eBook and the set of privileges that accompany it. When a customer purchases an Adobe PDF eBook directly from an e-commerce site, it's automatically downloaded into the customer's personal Acrobat eBook Reader library for immediate viewing. Acrobat eBook Reader unlocks the encrypted key that came with the eBook and its master voucher. Now the eBook is tied to the customer's Acrobat eBook Reader and can't be transmitted elsewhere unless lending or gifting permission has been enabled. The voucher also contains permissions (given by the publisher) for all the books: whether or not you can print and copy portions of a book; the publisher may allow you to print only a limited number of pages or to copy a limited number of selections in a given time period. The Acrobat eBook Reader keeps track of your printing and copying. When you print or copy, a dialog box tells you how much printing or copying you have done and asks whether you want to proceed. In addition, if the publisher allows, you can give or lend the book to someone else. 1. Copy/print: if printing and/or copying is allowed, but limited (the typical limitation is: you can print 10 pages in 10 days, or copy 10 portions of the text to the Clipboard in 10 days), these limitations can be defeated. Just create backup copies of the following files from Adobe Acrobat eBook Reader folder: Data\Vouchers\*.* Data\GB.dbd Data\Category.etb Data\Library*.etb Data\Library*.vld After copying or printing in Adobe Acrobat eBook Reader, just restore these files from backup, and copy/print limitations will be back to the status as if you have not copied or printed anything at all. 2. Lend/give: if these operations are allowed by the publisher, you can backup the above mentioned files, perform Lend/Give, and restore the files. The book(s) will remain in your lirbary, while the recipient (you gave the book to) will also have a copy. The impact of this vulnerability - -------------------------------- With [1], the owner of the book can copy/print unlimited number of portions of the book, ignoring the limitations set by the publisher. With [2], it is possible to create multiple copies (as many as you want) of any book (the 'Give' function is enabled for): make the backup; give it to someone else through network or IR port; restore from backup; give to the next recipient etc. Systems and/or configurations that are vulnerable - ------------------------------------------------- All versions of Adobe Content Server, and at least Windows version of Adobe Acrobat eBook Reader. Workarounds and/or fixes for this vulnerability - ----------------------------------------------- Not available. Though it is not very hard to implement a workaround by keeping and validating the checksum or digital singnature of the whole vouchers file (not only individual vouchers). For that, however, both Adobe Acrobat eBook Reader and Adobe Content Server should be seriously upated. -----BEGIN PGP SIGNATURE----- Version: 2.6 iQEVAwUAPTuhAoavf/iY3ldlAQHKhQf9GmRVtFoWefQF/VZDty/Hdn6tYiigOi4B 8yEMQ3792MDEXBNjPtTNLsSgiyEVauLiPwbMCtmWKKWbO7RL5319SQyn53o26SDR wsqkE1G7fpmRCNNtsdS2f3qOkld1GHHs70R9QGHYM/QjH43VHY9nB7vfEEprxS1X 3FiXubvFZqtfa+oryhN2aoma9zVF4YDxxlHjuwZ8xy8ZaaGhSwtvsMGR9SAp3mvQ 0gosxGBcBWE6tBkBMhP1TjrYMS8v6B+scz5sjr0lMgTYksskJao+2aTdc7UL1A2F 4lGEUPv5lpeL48f7dbc5mETjWitMtegBiEB4z8jE4Ba+t0MDNYW8tg== =54Qt -----END PGP SIGNATURE-----