Kaspersky ID:
KLA11162
Detect Date:
11/01/2017
Updated:
01/28/2026

Description

Multiple serious vulnerabilities have been found in Foxit Reader. Malicious users can exploit these vulnerabilities to obtain sensitive information and execute arbitrary code.

Below is a complete list of vulnerabilities:

  1. An out-of-bounds read vulnerability in the tile index member of SOT markers can be exploited remotely via specially designed website or file to obtain sensitive information;
  2. An improper validation vulnerability in the setAction method of Link objects can be exploited remotely via specially designed website or file to execute arbitrary code;
  3. An improper validation vulnerability in the arrowEnd attribute of Annotation objects can be exploited remotely via specially designed website or file to execute arbitrary code;
  4. An out-of-bounds read vulnerability in the parsing of JPEG2000 images embedded in PDF files can be exploited remotely via specially designed website or file to obtain sensitive information;
  5. An out-of-bounds read vulnerability in the channel number member of the cdef box files can be exploited remotely via specially designed website or file to obtain sensitive information;
  6. An out-of-bounds read vulnerability in the channel number member of the cdef box files can be exploited remotely via specially designed website or file to obtain sensitive information;
  7. An out-of-bounds read vulnerability in the tile index of the SOT marker in JPEG2000 images can be exploited remotely via specially designed website or file to obtain sensitive information;
  8. An out-of-bounds read vulnerability in the parsing of the xTsiz member of SIZ markers can be exploited remotely via specially designed website or file to obtain sensitive information;
  9. An out-of-bounds read vulnerability in the parsing of the xOsiz member of SIZ markers can be exploited remotely via specially designed website or file to obtain sensitive information;
  10. A type confusion vulnerability in the insert method of XFAScriptObject objects can be exploited remotely via specially designed website or file to execute arbitrary code;
  11. A type confusion vulnerability in the remove method of XFAScriptObject objects can be exploited remotely via specially designed website or file to execute arbitrary code;
  12. A type confusion vulnerability in the formNodes method of XFA Node objects can be exploited remotely via specially designed website or file to execute arbitrary code;
  13. A type confusion vulnerability in the append method of XFA Node objects can be exploited remotely via specially designed website or file to execute arbitrary code;
  14. A type confusion vulnerability in the w method of XFA Layout objects can be exploited remotely via specially designed website or file to execute arbitrary code;
  15. A type confusion vulnerability in the openList method of XFAScriptObject objects can be exploited remotely via specially designed website or file to execute arbitrary code;
  16. An improper validation vulnerability in the setFocus method of XFAScriptObject objects can be exploited remotely via specially designed website or file to execute arbitrary code;
  17. An improper validation vulnerability in the author attribute of Circle Annotation objects can be exploited remotely via specially designed website or file to execute arbitrary code;
  18. An improper validation vulnerability in the style attribute of Text Annotation objects can be exploited remotely via specially designed website or file to execute arbitrary code;
  19. An improper validation vulnerability in the style attribute of FileAttachment annotation objects can be exploited remotely via specially designed website or file to execute arbitrary code;
  20. A type confusion vulnerability in the page method of XFA Layout objects can be exploited remotely via specially designed website or file to execute arbitrary code;
  21. An improper validation vulnerability in the modDate attribute of Annotation objects can be exploited remotely via specially designed website or file to execute arbitrary code;
  22. A type confusion vulnerability in the pageSpan method of XFA Layout objects can be exploited remotely via specially designed website or file to execute arbitrary code;
  23. A type confusion vulnerability in the handling of references to the app object from FormCalc can be exploited remotely via specially designed website or file to execute arbitrary code;
  24. A type confusion vulnerability in FormCalc’s closeDoc method can be exploited remotely via specially designed website or file to execute arbitrary code;
  25. An out-of-bounds read vulnerability in the parsing of LZWDecode filters can be exploited remotely via specially designed website or file to obtain sensitive information;
  26. An out-of-bounds read vulnerability in the parsing of Image filters can be exploited remotely via specially designed website or file to obtain sensitive information;
  27. An improper validation vulnerability in the XFA’s bind element can be exploited remotely via specially designed website or file to execute arbitrary code;
  28. An improper validation vulnerability in XFA’s field element can be exploited remotely via specially designed website or file to execute arbitrary code;
  29. An improper validation vulnerability in the alignment attribute of Field objects can be exploited remotely via specially designed website or file to execute arbitrary code;
  30. A type confusion vulnerability in the picture elements within XFA forms can be exploited remotely via specially designed website or file to execute arbitrary code;
  31. An out-of-bounds read vulnerability in ImageField node of XFA forms can be exploited remotely via specially designed website or file to obtain sensitive information;
  32. An improper validation vulnerability in the author attribute of the Document object can be exploited remotely via specially designed website or file to execute arbitrary code;
  33. A type confussion vulnerability in the clearItems XFA method can be exploited remotely via specially designed website or file to execute arbitrary code;
  34. An improper validation vulnerability in the datasets element of XFA forms object can be exploited remotely via specially designed website or file to execute arbitrary code;
  35. An out-of-bounds read vulnerability in util.printf can be exploited remotely via specially designed website or file to obtain sensitive information;
  36. An improper validation vulnerability in the app.response method can be exploited remotely via specially designed website or file to execute arbitrary code;
  37. An improper validation vulnerability in the addAnnot method can be exploited remotely via specially designed website or file to execute arbitrary code;
  38. An improper validation vulnerability in the removeField method can be exploited remotely via specially designed website or file to execute arbitrary code;
  39. An out-of-bounds read vulnerability in the parsing of SOT markers can be exploited remotely via specially designed website or file to obtain sensitive information;
  40. An out-of-bounds read vulnerability in the parsing of the yTsiz member of SIZ markers can be exploited remotely via specially designed website or file to obtain sensitive information;

Original advisories

Exploitation

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Related products

CVE list

  • CVE-2017-14834
    critical
  • CVE-2017-14835
    critical
  • CVE-2017-14836
    critical
  • CVE-2017-14837
    critical
  • CVE-2017-16571
    critical
  • CVE-2017-16572
    critical
  • CVE-2017-16573
    high
  • CVE-2017-16574
    high
  • CVE-2017-16575
    critical
  • CVE-2017-16576
    critical
  • CVE-2017-16577
    critical
  • CVE-2017-16578
    critical
  • CVE-2017-16579
    high
  • CVE-2017-16580
    high
  • CVE-2017-16581
    critical
  • CVE-2017-16582
    critical
  • CVE-2017-16583
    critical
  • CVE-2017-16584
    high
  • CVE-2017-16585
    critical
  • CVE-2017-16586
    critical
  • CVE-2017-16587
    critical
  • CVE-2017-16588
    high
  • CVE-2017-16589
    high
  • CVE-2017-10956
    high
  • CVE-2017-10957
    critical
  • CVE-2017-10958
    critical
  • CVE-2017-10959
    critical
  • CVE-2017-14818
    high
  • CVE-2017-14819
    high
  • CVE-2017-14820
    high
  • CVE-2017-14821
    high
  • CVE-2017-14822
    high
  • CVE-2017-14823
    critical
  • CVE-2017-14824
    critical
  • CVE-2017-14825
    critical
  • CVE-2017-14826
    critical
  • CVE-2017-14827
    critical
  • CVE-2017-14828
    critical
  • CVE-2017-14829
    critical
  • CVE-2017-14830
    critical
  • CVE-2017-14831
    critical
  • CVE-2017-14832
    critical
  • CVE-2017-14833
    critical

Read more

Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com

Found an inaccuracy in the description of this vulnerability? Let us know!
Kaspersky Next
Let’s go Next: redefine your business’s cybersecurity
Learn more
New Kaspersky!
Your digital life deserves complete protection!
Learn more
Do you want to save your changes?
Your message has been sent successfully.