DIESER SERVICE KANN ÜBERSETZUNGEN VON GOOGLE ENTHALTEN. GOOGLE ÜBERNIMMT KEINERLEI VERANTWORTUNG FÜR DIE ÜBERSETZUNGEN. DARUNTER FÄLLT JEGLICHE VERANTWORTUNG IN BEZUG AUF RICHTIGKEIT UND ZUVERLÄSSIGKEIT SOWIE JEGLICHE STILLSCHWEIGENDEN GEWÄHRLEISTUNGEN DER MARKTGÄNGIGKEIT, NICHT-VERLETZUNG VON RECHTEN DRITTER ODER DER EIGNUNG FÜR EINEN BESTIMMTEN ZWECK. Die Website von Kaspersky Lab wurde für Ihre Bequemlichkeit mithilfe einer Übersetzungssoftware von Google Translate übersetzt. Es wurden angemessene Bemühungen für die Bereitstellung einer akkuraten Übersetzung unternommen. Bitte beachten Sie, dass automatisierte Übersetzungen nicht perfekt sind und menschliche Übersetzer in keinem Fall ersetzen sollen. Übersetzungen werden den Nutzern der Kaspersky-Lab-Website als Service und "wie sie sind" zur Verfügung gestellt. Die Richtigkeit, Zuverlässigkeit oder Korrektheit jeglicher Übersetzungen aus dem Englischen in eine andere Sprache wird weder ausdrücklich noch stillschweigend garantiert. Einige Inhalte (z. B. Bilder, Videos, Flash, usw.) können aufgrund der Einschränkungen der Übersetzungssoftware möglicherweise nicht inhaltsgetreu übersetzt werden.
Kaspersky ID:
KLA11314
Erkennungsdatum:
07/19/2018
Aktualisiert:
03/29/2019

Beschreibung

Multiple serious vulnerabilities were found in Foxit Reader. Malicious users can exploit these vulnerabilities to execute arbitrary code and obtain sensitive information.

Below is a complete list of vulnerabilities:

  1. An use-after-free vulnerability in Format event of the ComboBox fields can be exploited remotely via malicious website or file to execute arbitrary code;
  2. An use-after-free vulnerability in the handling of the resetForm method can be exploited remotely via malicious website or file to execute arbitrary code;
  3. An use-after-free vulnerability in the handling of the setFocus method can be exploited remotely via malicious website or file to execute arbitrary code;
  4. Multiple out-of-bounds read vulnerabilities in ConvertToPDF_x86.dll can be exploited remotely via malicious website or file to obtain sensitive information;
  5. An out-of-bounds write vulnerability in ConvertToPDF_x86.dll can be exploited remotely via malicious website or file to execute arbitrary code;
  6. A type confusion vulnerability in the addAdLayer method can be exploited remotely via malicious website or file to execute arbitrary code;
  7. A type confusion vulnerability in the addAnnot method can be exploited remotely via malicious website or file to execute arbitrary code;
  8. A type confusion vulnerability in the addField method can be exploited remotely via malicious website or file to execute arbitrary code;
  9. A type confusion vulnerability in the addPageOpenJSMessage method can be exploited remotely via malicious website or file to execute arbitrary code;
  10. A type confusion vulnerability in the calculateNow method can be exploited remotely via malicious website or file to execute arbitrary code;
  11. A type confusion vulnerability in the closeDoc method can be exploited remotely via malicious website or file to execute arbitrary code;
  12. A type confusion vulnerability in the convertTocPDF method can be exploited remotely via malicious website or file to execute arbitrary code;
  13. A type confusion vulnerability in the exportAsFDF method can be exploited remotely via malicious website or file to execute arbitrary code;
  14. A type confusion vulnerability in the exportAsXFDF method can be exploited remotely via malicious website or file to execute arbitrary code;
  15. A type confusion vulnerability in the exportDataObject method can be exploited remotely via malicious website or file to execute arbitrary code;
  16. A type confusion vulnerability in the getAnnot method can be exploited remotely via malicious website or file to execute arbitrary code;
  17. A type confusion vulnerability in the getDataBObject method can be exploited remotely via malicious website or file to execute arbitrary code;
  18. A type confusion vulnerability in the getField method can be exploited remotely via malicious website or file to execute arbitrary code;
  19. A type confusion vulnerability in the getIcon method can be exploited remotely via malicious website or file to execute arbitrary code;
  20. A type confusion vulnerability in the getLinks method can be exploited remotely via malicious website or file to execute arbitrary code;
  21. A type confusion vulnerability in the getNthFieldName method can be exploited remotely via malicious website or file to execute arbitrary code;
  22. A type confusion vulnerability in the getOCGs method can be exploited remotely via malicious website or file to execute arbitrary code;
  23. A type confusion vulnerability in the getPageBox method can be exploited remotely via malicious website or file to execute arbitrary code;
  24. A type confusion vulnerability in the getPageNthWord method can be exploited remotely via malicious website or file to execute arbitrary code;
  25. A type confusion vulnerability in the getPageNthWordQuads method can be exploited remotely via malicious website or file to execute arbitrary code;
  26. A type confusion vulnerability in the getPageRotation method can be exploited remotely via malicious website or file to execute arbitrary code;
  27. A type confusion vulnerability in the getTemplate method can be exploited remotely via malicious website or file to execute arbitrary code;
  28. A type confusion vulnerability in the getURL method can be exploited remotely via malicious website or file to execute arbitrary code;
  29. A type confusion vulnerability in the getVersionID method can be exploited remotely via malicious website or file to execute arbitrary code;
  30. A type confusion vulnerability in the importAnFDF method can be exploited remotely via malicious website or file to execute arbitrary code;
  31. A type confusion vulnerability in the importAnXFDX method can be exploited remotely via malicious website or file to execute arbitrary code;
  32. A type confusion vulnerability in the importDataObject method can be exploited remotely via malicious website or file to execute arbitrary code;
  33. A type confusion vulnerability in the importTextData method can be exploited remotely via malicious website or file to execute arbitrary code;
  34. A type confusion vulnerability in the mailForm method can be exploited remotely via malicious website or file to execute arbitrary code;
  35. A type confusion vulnerability in the print method can be exploited remotely via malicious website or file to execute arbitrary code;
  36. A type confusion vulnerability in the removeDataObject method can be exploited remotely via malicious website or file to execute arbitrary code;
  37. A type confusion vulnerability in the removeField method can be exploited remotely via malicious website or file to execute arbitrary code;
  38. A type confusion vulnerability in the removeIcon method can be exploited remotely via malicious website or file to execute arbitrary code;
  39. A type confusion vulnerability in the removeTemplate method can be exploited remotely via malicious website or file to execute arbitrary code;
  40. A type confusion vulnerability in the scroll method can be exploited remotely via malicious website or file to execute arbitrary code;
  41. A type confusion vulnerability in the spawnPageFromTemplate method can be exploited remotely via malicious website or file to execute arbitrary code;
  42. A type confusion vulnerability in the submitForm method can be exploited remotely via malicious website or file to execute arbitrary code;
  43. A type confusion vulnerability in the mailDoc method can be exploited remotely via malicious website or file to execute arbitrary code;
  44. A type confusion vulnerability in the getPageNumWords method can be exploited remotely via malicious website or file to execute arbitrary code;
  45. A type confusion vulnerability in the resetForm method can be exploited remotely via malicious website or file to execute arbitrary code;
  46. An arbitrary file write vulnerability in the exportAsFDF XFA function can be exploited remotely via malicious website or file to execute arbitrary code;
  47. An arbitrary file write vulnerability in the exportData XFA function can be exploited remotely via malicious website or file to execute arbitrary code;
  48. An uninitialized pointer vulnerability in the handling of FlateDecode streams can be exploited remotely via malicious website or file to execute arbitrary code;
  49. An use-after-free vulnerability in the highlightMode attribute can be exploited remotely via malicious website or file to execute arbitrary code;
  50. An use-after-free vulnerability in the handling of the newDoc function can be exploited remotely via malicious website or file to execute arbitrary code;
  51. A type confusion vulnerability in the handling of the oneOfChild attribute can be exploited remotely via malicious website or file to execute arbitrary code;
  52. A type confusion vulnerability in the handling of arguments passed to the mailDoc function can be exploited remotely via malicious website or file to execute arbitrary code;
  53. A type confusion vulnerability in the handling of arguments passed to the instanceManager.nodes.append function can be exploited remotely via malicious website or file to execute arbitrary code;
  54. A type confusion vulnerability in the handling of arguments passed to the setFocus function can be exploited remotely via malicious website or file to execute arbitrary code;
  55. An out-of-bound read vulnerability in the parsing of PDF documents can be exploited remotely via malicious website or file to obtain sensitive information;
  56. A heap-based buffer overflow vulnerability in the parsing of PDF documents can be exploited remotely via malicious website or file to execute arbitrary code;
  57. An use-after-free vulnerability in the addAnnot function while parsing of PDF documents can be exploited remotely via malicious website or file to execute arbitrary code;
  58. An use-after-free vulnerability in the createTemplate function while parsing of PDF documents can be exploited remotely via malicious website or file to execute arbitrary code;
  59. An use-after-free vulnerability in the setAction function while parsing of PDF documents can be exploited remotely via malicious website or file to execute arbitrary code;
  60. An use-after-free vulnerability in the processing of FileAttachment annotations can be exploited remotely via malicious website or file to execute arbitrary code;
  61. An integer overflow vulnerability in the handling of PDF documents can be exploited remotely via malicious website or file to execute arbitrary code;
  62. An use-after-free vulnerability in the borderEffectStyle function while processing of Circle annotations can be exploited remotely via malicious website or file to execute arbitrary code;
  63. An use-after-free vulnerability in the processing of FreeText annotations can be exploited remotely via malicious website or file to execute arbitrary code;
  64. An use-after-free vulnerability in the processing of Ink annotations can be exploited remotely via malicious website or file to execute arbitrary code;
  65. An use-after-free vulnerability in the processing of Line annotations can be exploited remotely via malicious website or file to execute arbitrary code;
  66. An use-after-free vulnerability inthe processing of Polygon annotations can be exploited remotely via malicious website or file to execute arbitrary code;
  67. An use-after-free vulnerability in the processing of Sound annotations can be exploited remotely via malicious website or file to execute arbitrary code;
  68. An use-after-free vulnerability in the processing of Square annotations can be exploited remotely via malicious website or file to execute arbitrary code;
  69. An use-after-free vulnerability in the processing of StrikeOut annotations can be exploited remotely via malicious website or file to execute arbitrary code;
  70. An use-after-free vulnerability in the processing of Text annotations can be exploited remotely via malicious website or file to execute arbitrary code;
  71. An use-after-free vulnerability in the processing of PolyLine annotations can be exploited remotely via malicious website or file to execute arbitrary code;
  72. An use-after-free vulnerability in the processing of button objects can be exploited remotely via malicious website or file to execute arbitrary code;
  73. An use-after-free vulnerability in the processing of Link objects can be exploited remotely via malicious website or file to execute arbitrary code;
  74. An use-after-free vulnerability in the handling of the valueAsString function can be exploited remotely via malicious website or file to execute arbitrary code;
  75. An use-after-free vulnerability in the handling of the SeedValue Generic Object parameter provided to the signatureSetSeedValue function can be exploited remotely via malicious website or file to execute arbitrary code;
  76. An use-after-free vulnerability in the handling of events can be exploited remotely via malicious website or file to execute arbitrary code;
  77. A type confussion vulnerability in the handling of XFA events can be exploited remotely via malicious website or file to execute arbitrary code;
  78. An use-after-free vulnerability in the handling of the exportAsFDF function can be exploited remotely via malicious website or file to execute arbitrary code;
  79. A type confusion vulnerability in the handling of PDF files can be exploited remotely via malicious website or file to execute arbitrary code;
  80. Multiple use-after-free vulnerabilities in the handling of annotations can be exploited remotely via malicious website or file to execute arbitrary code;
  81. An out-of-bounds read vulnerability in the processing of PDF documents can be exploited remotely via malicious website or file to obtain sensitive information;
  82. Multiple type confusion vulnerabilities in the processing of PDF documents can be exploited remotely via malicious website or file to execute arbitrary code;
  83. Multiple use-after-free vulnerabilities in the the JavaScript engine can be exploited remotely via malicious website or file to execute arbitrary code;

Ursprüngliche Informationshinweise

CVE Liste

  • CVE-2018-11617
    critical
  • CVE-2018-11618
    critical
  • CVE-2018-11619
    critical
  • CVE-2018-11620
    critical
  • CVE-2018-11621
    critical
  • CVE-2018-11622
    critical
  • CVE-2018-11623
    critical
  • CVE-2018-14241
    critical
  • CVE-2018-14242
    critical
  • CVE-2018-14243
    critical
  • CVE-2018-14244
    critical
  • CVE-2018-14245
    critical
  • CVE-2018-14246
    critical
  • CVE-2018-14247
    critical
  • CVE-2018-14248
    critical
  • CVE-2018-14249
    critical
  • CVE-2018-14250
    critical
  • CVE-2018-14251
    critical
  • CVE-2018-14252
    critical
  • CVE-2018-14253
    critical
  • CVE-2018-14254
    critical
  • CVE-2018-14255
    critical
  • CVE-2018-14256
    critical
  • CVE-2018-14257
    critical
  • CVE-2018-14258
    critical
  • CVE-2018-14259
    critical
  • CVE-2018-14260
    critical
  • CVE-2018-14261
    critical
  • CVE-2018-14262
    critical
  • CVE-2018-14263
    critical
  • CVE-2018-14264
    critical
  • CVE-2018-14265
    critical
  • CVE-2018-14266
    critical
  • CVE-2018-14267
    critical
  • CVE-2018-14268
    critical
  • CVE-2018-14269
    critical
  • CVE-2018-14270
    critical
  • CVE-2018-14271
    critical
  • CVE-2018-14272
    critical
  • CVE-2018-14273
    critical
  • CVE-2018-14274
    critical
  • CVE-2018-14275
    critical
  • CVE-2018-14276
    critical
  • CVE-2018-14277
    critical
  • CVE-2018-14278
    critical
  • CVE-2018-14279
    critical
  • CVE-2018-14280
    critical
  • CVE-2018-14281
    critical
  • CVE-2018-14282
    critical
  • CVE-2018-14283
    critical
  • CVE-2018-14284
    critical
  • CVE-2018-14285
    critical
  • CVE-2018-14286
    critical
  • CVE-2018-14287
    critical
  • CVE-2018-14288
    critical
  • CVE-2018-14289
    critical
  • CVE-2018-14290
    critical
  • CVE-2018-14291
    critical
  • CVE-2018-14292
    critical
  • CVE-2018-14293
    critical
  • CVE-2018-14294
    critical
  • CVE-2018-14295
    critical
  • CVE-2018-14296
    critical
  • CVE-2018-14297
    critical
  • CVE-2018-14298
    critical
  • CVE-2018-14299
    critical
  • CVE-2018-14300
    critical
  • CVE-2018-14301
    critical
  • CVE-2018-14302
    critical
  • CVE-2018-14303
    critical
  • CVE-2018-14304
    critical
  • CVE-2018-14305
    critical
  • CVE-2018-14306
    critical
  • CVE-2018-14307
    critical
  • CVE-2018-14308
    critical
  • CVE-2018-14309
    critical
  • CVE-2018-14310
    critical
  • CVE-2018-14311
    critical
  • CVE-2018-14312
    critical
  • CVE-2018-14313
    critical
  • CVE-2018-14314
    critical
  • CVE-2018-14315
    critical
  • CVE-2018-14316
    critical
  • CVE-2018-14317
    critical
  • CVE-2018-3924
    critical
  • CVE-2018-3939
    critical

Mehr erfahren

Informieren Sie sich über die Statistiken der in Ihrer Region verbreiteten Sicherheitslücken statistics.securelist.com

Sie haben einen Fehler in der Beschreibung der Schwachstelle gefunden? Mitteilen!
Kaspersky Next
Let´s go Next: Cybersicherheit neu gedacht
Erfahren Sie mehr
Neu: Kaspersky!
Dein digitales Leben verdient umfassenden Schutz!
Erfahren Sie mehr
Confirm changes?
Your message has been sent successfully.