KLA10836
Multiple vulnerabilities in Foxit Reader and Foxit PhantomPDF
Updated: 03/15/2019
Detect date
?
06/27/2016
Severity
?
Critical
Description

Multiple serious vulnerabilities have been found in multiple Foxit products. Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code or obtain sensitive information.

Below is a complete list of vulnerabilities

  1. Use-after-free vulnerability can be exploited remotely via a specially designed XFA or PDF file to execute arbitrary code;
  2. An unknown vulnerability can be exploited remotely via a specially designed PDF content to obtain sensitive information;
  3. An unknown vulnerability can be exploited remotely to execute arbitrary file;
  4. Out-of-bounds vulnerability at ConvertToPDF module can be exploited remotely via a specially designed TIFF, JPEG, GIF or BMP file to execute arbitrary code;
  5. Out-of-bounds vulnerability can be exploited remotely to execute arbitrary code;
  6. Buffer overflow vulnerability can be exploited remotely via a specially designed TIFF files to execute arbitrary code;
  7. Buffer overflow vulnerability can be exploited remotely via a specially designed GoToR string to execute arbitrary code;
  8. An unknown vulnerability can be exploited remotely via a specially designed PDF file to cause denial of service or execute arbitrary code;
Affected products

Foxit Reader versions earlier than 8.0 (Windows)
Foxit PhantomPDF versions earlier than 8.0 (Windows)

Solution

Update to the latest version
Foxit Software downloads page

Original advisories

Foxit Software security bulletins

Impacts
?
ACE 
[?]

OSI 
[?]

DoS 
[?]
CVE-IDS
?
CVE-2016-61696.8Critical