Beschreibung
Multiple serious vulnerabilities were found in Foxit Reader. Malicious users can exploit these vulnerabilities to execute arbitrary code and obtain sensitive information.
Below is a complete list of vulnerabilities:
- An use-after-free vulnerability in Format event of the ComboBox fields can be exploited remotely via malicious website or file to execute arbitrary code;
- An use-after-free vulnerability in the handling of the resetForm method can be exploited remotely via malicious website or file to execute arbitrary code;
- An use-after-free vulnerability in the handling of the setFocus method can be exploited remotely via malicious website or file to execute arbitrary code;
- Multiple out-of-bounds read vulnerabilities in ConvertToPDF_x86.dll can be exploited remotely via malicious website or file to obtain sensitive information;
- An out-of-bounds write vulnerability in ConvertToPDF_x86.dll can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the addAdLayer method can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the addAnnot method can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the addField method can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the addPageOpenJSMessage method can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the calculateNow method can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the closeDoc method can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the convertTocPDF method can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the exportAsFDF method can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the exportAsXFDF method can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the exportDataObject method can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the getAnnot method can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the getDataBObject method can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the getField method can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the getIcon method can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the getLinks method can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the getNthFieldName method can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the getOCGs method can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the getPageBox method can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the getPageNthWord method can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the getPageNthWordQuads method can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the getPageRotation method can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the getTemplate method can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the getURL method can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the getVersionID method can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the importAnFDF method can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the importAnXFDX method can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the importDataObject method can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the importTextData method can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the mailForm method can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the print method can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the removeDataObject method can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the removeField method can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the removeIcon method can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the removeTemplate method can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the scroll method can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the spawnPageFromTemplate method can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the submitForm method can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the mailDoc method can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the getPageNumWords method can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the resetForm method can be exploited remotely via malicious website or file to execute arbitrary code;
- An arbitrary file write vulnerability in the exportAsFDF XFA function can be exploited remotely via malicious website or file to execute arbitrary code;
- An arbitrary file write vulnerability in the exportData XFA function can be exploited remotely via malicious website or file to execute arbitrary code;
- An uninitialized pointer vulnerability in the handling of FlateDecode streams can be exploited remotely via malicious website or file to execute arbitrary code;
- An use-after-free vulnerability in the highlightMode attribute can be exploited remotely via malicious website or file to execute arbitrary code;
- An use-after-free vulnerability in the handling of the newDoc function can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the handling of the oneOfChild attribute can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the handling of arguments passed to the mailDoc function can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the handling of arguments passed to the instanceManager.nodes.append function can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the handling of arguments passed to the setFocus function can be exploited remotely via malicious website or file to execute arbitrary code;
- An out-of-bound read vulnerability in the parsing of PDF documents can be exploited remotely via malicious website or file to obtain sensitive information;
- A heap-based buffer overflow vulnerability in the parsing of PDF documents can be exploited remotely via malicious website or file to execute arbitrary code;
- An use-after-free vulnerability in the addAnnot function while parsing of PDF documents can be exploited remotely via malicious website or file to execute arbitrary code;
- An use-after-free vulnerability in the createTemplate function while parsing of PDF documents can be exploited remotely via malicious website or file to execute arbitrary code;
- An use-after-free vulnerability in the setAction function while parsing of PDF documents can be exploited remotely via malicious website or file to execute arbitrary code;
- An use-after-free vulnerability in the processing of FileAttachment annotations can be exploited remotely via malicious website or file to execute arbitrary code;
- An integer overflow vulnerability in the handling of PDF documents can be exploited remotely via malicious website or file to execute arbitrary code;
- An use-after-free vulnerability in the borderEffectStyle function while processing of Circle annotations can be exploited remotely via malicious website or file to execute arbitrary code;
- An use-after-free vulnerability in the processing of FreeText annotations can be exploited remotely via malicious website or file to execute arbitrary code;
- An use-after-free vulnerability in the processing of Ink annotations can be exploited remotely via malicious website or file to execute arbitrary code;
- An use-after-free vulnerability in the processing of Line annotations can be exploited remotely via malicious website or file to execute arbitrary code;
- An use-after-free vulnerability inthe processing of Polygon annotations can be exploited remotely via malicious website or file to execute arbitrary code;
- An use-after-free vulnerability in the processing of Sound annotations can be exploited remotely via malicious website or file to execute arbitrary code;
- An use-after-free vulnerability in the processing of Square annotations can be exploited remotely via malicious website or file to execute arbitrary code;
- An use-after-free vulnerability in the processing of StrikeOut annotations can be exploited remotely via malicious website or file to execute arbitrary code;
- An use-after-free vulnerability in the processing of Text annotations can be exploited remotely via malicious website or file to execute arbitrary code;
- An use-after-free vulnerability in the processing of PolyLine annotations can be exploited remotely via malicious website or file to execute arbitrary code;
- An use-after-free vulnerability in the processing of button objects can be exploited remotely via malicious website or file to execute arbitrary code;
- An use-after-free vulnerability in the processing of Link objects can be exploited remotely via malicious website or file to execute arbitrary code;
- An use-after-free vulnerability in the handling of the valueAsString function can be exploited remotely via malicious website or file to execute arbitrary code;
- An use-after-free vulnerability in the handling of the SeedValue Generic Object parameter provided to the signatureSetSeedValue function can be exploited remotely via malicious website or file to execute arbitrary code;
- An use-after-free vulnerability in the handling of events can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confussion vulnerability in the handling of XFA events can be exploited remotely via malicious website or file to execute arbitrary code;
- An use-after-free vulnerability in the handling of the exportAsFDF function can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the handling of PDF files can be exploited remotely via malicious website or file to execute arbitrary code;
- Multiple use-after-free vulnerabilities in the handling of annotations can be exploited remotely via malicious website or file to execute arbitrary code;
- An out-of-bounds read vulnerability in the processing of PDF documents can be exploited remotely via malicious website or file to obtain sensitive information;
- Multiple type confusion vulnerabilities in the processing of PDF documents can be exploited remotely via malicious website or file to execute arbitrary code;
- Multiple use-after-free vulnerabilities in the the JavaScript engine can be exploited remotely via malicious website or file to execute arbitrary code;
Ursprüngliche Informationshinweise
CVE Liste
- CVE-2018-11617 critical
- CVE-2018-11618 critical
- CVE-2018-11619 critical
- CVE-2018-11620 critical
- CVE-2018-11621 critical
- CVE-2018-11622 critical
- CVE-2018-11623 critical
- CVE-2018-14241 critical
- CVE-2018-14242 critical
- CVE-2018-14243 critical
- CVE-2018-14244 critical
- CVE-2018-14245 critical
- CVE-2018-14246 critical
- CVE-2018-14247 critical
- CVE-2018-14248 critical
- CVE-2018-14249 critical
- CVE-2018-14250 critical
- CVE-2018-14251 critical
- CVE-2018-14252 critical
- CVE-2018-14253 critical
- CVE-2018-14254 critical
- CVE-2018-14255 critical
- CVE-2018-14256 critical
- CVE-2018-14257 critical
- CVE-2018-14258 critical
- CVE-2018-14259 critical
- CVE-2018-14260 critical
- CVE-2018-14261 critical
- CVE-2018-14262 critical
- CVE-2018-14263 critical
- CVE-2018-14264 critical
- CVE-2018-14265 critical
- CVE-2018-14266 critical
- CVE-2018-14267 critical
- CVE-2018-14268 critical
- CVE-2018-14269 critical
- CVE-2018-14270 critical
- CVE-2018-14271 critical
- CVE-2018-14272 critical
- CVE-2018-14273 critical
- CVE-2018-14274 critical
- CVE-2018-14275 critical
- CVE-2018-14276 critical
- CVE-2018-14277 critical
- CVE-2018-14278 critical
- CVE-2018-14279 critical
- CVE-2018-14280 critical
- CVE-2018-14281 critical
- CVE-2018-14282 critical
- CVE-2018-14283 critical
- CVE-2018-14284 critical
- CVE-2018-14285 critical
- CVE-2018-14286 critical
- CVE-2018-14287 critical
- CVE-2018-14288 critical
- CVE-2018-14289 critical
- CVE-2018-14290 critical
- CVE-2018-14291 critical
- CVE-2018-14292 critical
- CVE-2018-14293 critical
- CVE-2018-14294 critical
- CVE-2018-14295 critical
- CVE-2018-14296 critical
- CVE-2018-14297 critical
- CVE-2018-14298 critical
- CVE-2018-14299 critical
- CVE-2018-14300 critical
- CVE-2018-14301 critical
- CVE-2018-14302 critical
- CVE-2018-14303 critical
- CVE-2018-14304 critical
- CVE-2018-14305 critical
- CVE-2018-14306 critical
- CVE-2018-14307 critical
- CVE-2018-14308 critical
- CVE-2018-14309 critical
- CVE-2018-14310 critical
- CVE-2018-14311 critical
- CVE-2018-14312 critical
- CVE-2018-14313 critical
- CVE-2018-14314 critical
- CVE-2018-14315 critical
- CVE-2018-14316 critical
- CVE-2018-14317 critical
- CVE-2018-3924 critical
- CVE-2018-3939 critical
Mehr erfahren
Informieren Sie sich über die Statistiken der in Ihrer Region verbreiteten Sicherheitslücken statistics.securelist.com
Sie haben einen Fehler in der Beschreibung der Schwachstelle gefunden? Mitteilen!