KLA10891
Multiple vulnerabilities in Foxit Reader

Updated: 06/03/2020
Detect date
?
10/18/2016
Severity
?
High
Description

Multiple serious vulnerabilities have been found in Foxit Reader. Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code or obtain sensitive information.

Below is a complete list of vulnerabilities

  1. Heap corruption at thumbnail shell extension plugin can be exploited remotely to cause denial of service via a specially designed PDF document;
  2. Multiple out of bounds read/write vulnerabilities can be exploited remotely to execute arbitrary code via a specially designed PDF document;
  3. Out of bounds read at ConvertToPDF plugin can be exploited remotely to cause denial of service via a specially designed TIFF image.

Technical details

Vulnerability (1) related to FoxitThumbnailHndlr_x86.dll and can be exploited via a specially designed JPEG2000 image embedded in a PDF document.

Vulnerabilities under point (2):

– can be triggered when gflags app is enabled and can be exploited via a specially designed BMP or TIFF image embedded in the XFA stream in a PDF document.

– can be exploited via a specially designed JPEG2000 image embedded in a PDF document.

Vulnerability (3) can be triggered when gflags app is enabled.

Affected products

Foxit Reader versions earlier than 8.1

Solution

Update to the latest version
Foxit Reader download page

Original advisories

Foxit Software security bulletins page

Impacts
?
ACE 
[?]

OSI 
[?]

DoS 
[?]
Related products
Foxit Reader
CVE-IDS
?
Find out the statistics of the vulnerabilities spreading in your region