Beschreibung
Multiple serious vulnerabilities have been found in Foxit Reader. Malicious users can exploit these vulnerabilities to obtain sensitive information and execute arbitrary code.
Below is a complete list of vulnerabilities:
- An out-of-bounds read vulnerability in the tile index member of SOT markers can be exploited remotely via specially designed website or file to obtain sensitive information;
- An improper validation vulnerability in the setAction method of Link objects can be exploited remotely via specially designed website or file to execute arbitrary code;
- An improper validation vulnerability in the arrowEnd attribute of Annotation objects can be exploited remotely via specially designed website or file to execute arbitrary code;
- An out-of-bounds read vulnerability in the parsing of JPEG2000 images embedded in PDF files can be exploited remotely via specially designed website or file to obtain sensitive information;
- An out-of-bounds read vulnerability in the channel number member of the cdef box files can be exploited remotely via specially designed website or file to obtain sensitive information;
- An out-of-bounds read vulnerability in the channel number member of the cdef box files can be exploited remotely via specially designed website or file to obtain sensitive information;
- An out-of-bounds read vulnerability in the tile index of the SOT marker in JPEG2000 images can be exploited remotely via specially designed website or file to obtain sensitive information;
- An out-of-bounds read vulnerability in the parsing of the xTsiz member of SIZ markers can be exploited remotely via specially designed website or file to obtain sensitive information;
- An out-of-bounds read vulnerability in the parsing of the xOsiz member of SIZ markers can be exploited remotely via specially designed website or file to obtain sensitive information;
- A type confusion vulnerability in the insert method of XFAScriptObject objects can be exploited remotely via specially designed website or file to execute arbitrary code;
- A type confusion vulnerability in the remove method of XFAScriptObject objects can be exploited remotely via specially designed website or file to execute arbitrary code;
- A type confusion vulnerability in the formNodes method of XFA Node objects can be exploited remotely via specially designed website or file to execute arbitrary code;
- A type confusion vulnerability in the append method of XFA Node objects can be exploited remotely via specially designed website or file to execute arbitrary code;
- A type confusion vulnerability in the w method of XFA Layout objects can be exploited remotely via specially designed website or file to execute arbitrary code;
- A type confusion vulnerability in the openList method of XFAScriptObject objects can be exploited remotely via specially designed website or file to execute arbitrary code;
- An improper validation vulnerability in the setFocus method of XFAScriptObject objects can be exploited remotely via specially designed website or file to execute arbitrary code;
- An improper validation vulnerability in the author attribute of Circle Annotation objects can be exploited remotely via specially designed website or file to execute arbitrary code;
- An improper validation vulnerability in the style attribute of Text Annotation objects can be exploited remotely via specially designed website or file to execute arbitrary code;
- An improper validation vulnerability in the style attribute of FileAttachment annotation objects can be exploited remotely via specially designed website or file to execute arbitrary code;
- A type confusion vulnerability in the page method of XFA Layout objects can be exploited remotely via specially designed website or file to execute arbitrary code;
- An improper validation vulnerability in the modDate attribute of Annotation objects can be exploited remotely via specially designed website or file to execute arbitrary code;
- A type confusion vulnerability in the pageSpan method of XFA Layout objects can be exploited remotely via specially designed website or file to execute arbitrary code;
- A type confusion vulnerability in the handling of references to the app object from FormCalc can be exploited remotely via specially designed website or file to execute arbitrary code;
- A type confusion vulnerability in FormCalc’s closeDoc method can be exploited remotely via specially designed website or file to execute arbitrary code;
- An out-of-bounds read vulnerability in the parsing of LZWDecode filters can be exploited remotely via specially designed website or file to obtain sensitive information;
- An out-of-bounds read vulnerability in the parsing of Image filters can be exploited remotely via specially designed website or file to obtain sensitive information;
- An improper validation vulnerability in the XFA’s bind element can be exploited remotely via specially designed website or file to execute arbitrary code;
- An improper validation vulnerability in XFA’s field element can be exploited remotely via specially designed website or file to execute arbitrary code;
- An improper validation vulnerability in the alignment attribute of Field objects can be exploited remotely via specially designed website or file to execute arbitrary code;
- A type confusion vulnerability in the picture elements within XFA forms can be exploited remotely via specially designed website or file to execute arbitrary code;
- An out-of-bounds read vulnerability in ImageField node of XFA forms can be exploited remotely via specially designed website or file to obtain sensitive information;
- An improper validation vulnerability in the author attribute of the Document object can be exploited remotely via specially designed website or file to execute arbitrary code;
- A type confussion vulnerability in the clearItems XFA method can be exploited remotely via specially designed website or file to execute arbitrary code;
- An improper validation vulnerability in the datasets element of XFA forms object can be exploited remotely via specially designed website or file to execute arbitrary code;
- An out-of-bounds read vulnerability in util.printf can be exploited remotely via specially designed website or file to obtain sensitive information;
- An improper validation vulnerability in the app.response method can be exploited remotely via specially designed website or file to execute arbitrary code;
- An improper validation vulnerability in the addAnnot method can be exploited remotely via specially designed website or file to execute arbitrary code;
- An improper validation vulnerability in the removeField method can be exploited remotely via specially designed website or file to execute arbitrary code;
- An out-of-bounds read vulnerability in the parsing of SOT markers can be exploited remotely via specially designed website or file to obtain sensitive information;
- An out-of-bounds read vulnerability in the parsing of the yTsiz member of SIZ markers can be exploited remotely via specially designed website or file to obtain sensitive information;
Ursprüngliche Informationshinweise
CVE Liste
- CVE-2017-14834 critical
- CVE-2017-14835 critical
- CVE-2017-14836 critical
- CVE-2017-14837 critical
- CVE-2017-16571 critical
- CVE-2017-16572 critical
- CVE-2017-16573 critical
- CVE-2017-16574 critical
- CVE-2017-16575 critical
- CVE-2017-16576 critical
- CVE-2017-16577 critical
- CVE-2017-16578 critical
- CVE-2017-16579 critical
- CVE-2017-16580 critical
- CVE-2017-16581 critical
- CVE-2017-16582 critical
- CVE-2017-16583 critical
- CVE-2017-16584 critical
- CVE-2017-16585 critical
- CVE-2017-16586 critical
- CVE-2017-16587 critical
- CVE-2017-16588 critical
- CVE-2017-16589 critical
- CVE-2017-10956 critical
- CVE-2017-10957 critical
- CVE-2017-10958 critical
- CVE-2017-10959 critical
- CVE-2017-14818 critical
- CVE-2017-14819 critical
- CVE-2017-14820 critical
- CVE-2017-14821 critical
- CVE-2017-14822 critical
- CVE-2017-14823 critical
- CVE-2017-14824 critical
- CVE-2017-14825 critical
- CVE-2017-14826 critical
- CVE-2017-14827 critical
- CVE-2017-14828 critical
- CVE-2017-14829 critical
- CVE-2017-14830 critical
- CVE-2017-14831 critical
- CVE-2017-14832 critical
- CVE-2017-14833 critical
Mehr erfahren
Informieren Sie sich über die Statistiken der in Ihrer Region verbreiteten Sicherheitslücken statistics.securelist.com
Sie haben einen Fehler in der Beschreibung der Schwachstelle gefunden? Mitteilen!