Description
Multiple serious vulnerabilities have been found in Foxit Reader. Malicious users can exploit these vulnerabilities to obtain sensitive information and execute arbitrary code.
Below is a complete list of vulnerabilities:
- An out-of-bounds read vulnerability in the tile index member of SOT markers can be exploited remotely via specially designed website or file to obtain sensitive information;
- An improper validation vulnerability in the setAction method of Link objects can be exploited remotely via specially designed website or file to execute arbitrary code;
- An improper validation vulnerability in the arrowEnd attribute of Annotation objects can be exploited remotely via specially designed website or file to execute arbitrary code;
- An out-of-bounds read vulnerability in the parsing of JPEG2000 images embedded in PDF files can be exploited remotely via specially designed website or file to obtain sensitive information;
- An out-of-bounds read vulnerability in the channel number member of the cdef box files can be exploited remotely via specially designed website or file to obtain sensitive information;
- An out-of-bounds read vulnerability in the channel number member of the cdef box files can be exploited remotely via specially designed website or file to obtain sensitive information;
- An out-of-bounds read vulnerability in the tile index of the SOT marker in JPEG2000 images can be exploited remotely via specially designed website or file to obtain sensitive information;
- An out-of-bounds read vulnerability in the parsing of the xTsiz member of SIZ markers can be exploited remotely via specially designed website or file to obtain sensitive information;
- An out-of-bounds read vulnerability in the parsing of the xOsiz member of SIZ markers can be exploited remotely via specially designed website or file to obtain sensitive information;
- A type confusion vulnerability in the insert method of XFAScriptObject objects can be exploited remotely via specially designed website or file to execute arbitrary code;
- A type confusion vulnerability in the remove method of XFAScriptObject objects can be exploited remotely via specially designed website or file to execute arbitrary code;
- A type confusion vulnerability in the formNodes method of XFA Node objects can be exploited remotely via specially designed website or file to execute arbitrary code;
- A type confusion vulnerability in the append method of XFA Node objects can be exploited remotely via specially designed website or file to execute arbitrary code;
- A type confusion vulnerability in the w method of XFA Layout objects can be exploited remotely via specially designed website or file to execute arbitrary code;
- A type confusion vulnerability in the openList method of XFAScriptObject objects can be exploited remotely via specially designed website or file to execute arbitrary code;
- An improper validation vulnerability in the setFocus method of XFAScriptObject objects can be exploited remotely via specially designed website or file to execute arbitrary code;
- An improper validation vulnerability in the author attribute of Circle Annotation objects can be exploited remotely via specially designed website or file to execute arbitrary code;
- An improper validation vulnerability in the style attribute of Text Annotation objects can be exploited remotely via specially designed website or file to execute arbitrary code;
- An improper validation vulnerability in the style attribute of FileAttachment annotation objects can be exploited remotely via specially designed website or file to execute arbitrary code;
- A type confusion vulnerability in the page method of XFA Layout objects can be exploited remotely via specially designed website or file to execute arbitrary code;
- An improper validation vulnerability in the modDate attribute of Annotation objects can be exploited remotely via specially designed website or file to execute arbitrary code;
- A type confusion vulnerability in the pageSpan method of XFA Layout objects can be exploited remotely via specially designed website or file to execute arbitrary code;
- A type confusion vulnerability in the handling of references to the app object from FormCalc can be exploited remotely via specially designed website or file to execute arbitrary code;
- A type confusion vulnerability in FormCalc’s closeDoc method can be exploited remotely via specially designed website or file to execute arbitrary code;
- An out-of-bounds read vulnerability in the parsing of LZWDecode filters can be exploited remotely via specially designed website or file to obtain sensitive information;
- An out-of-bounds read vulnerability in the parsing of Image filters can be exploited remotely via specially designed website or file to obtain sensitive information;
- An improper validation vulnerability in the XFA’s bind element can be exploited remotely via specially designed website or file to execute arbitrary code;
- An improper validation vulnerability in XFA’s field element can be exploited remotely via specially designed website or file to execute arbitrary code;
- An improper validation vulnerability in the alignment attribute of Field objects can be exploited remotely via specially designed website or file to execute arbitrary code;
- A type confusion vulnerability in the picture elements within XFA forms can be exploited remotely via specially designed website or file to execute arbitrary code;
- An out-of-bounds read vulnerability in ImageField node of XFA forms can be exploited remotely via specially designed website or file to obtain sensitive information;
- An improper validation vulnerability in the author attribute of the Document object can be exploited remotely via specially designed website or file to execute arbitrary code;
- A type confussion vulnerability in the clearItems XFA method can be exploited remotely via specially designed website or file to execute arbitrary code;
- An improper validation vulnerability in the datasets element of XFA forms object can be exploited remotely via specially designed website or file to execute arbitrary code;
- An out-of-bounds read vulnerability in util.printf can be exploited remotely via specially designed website or file to obtain sensitive information;
- An improper validation vulnerability in the app.response method can be exploited remotely via specially designed website or file to execute arbitrary code;
- An improper validation vulnerability in the addAnnot method can be exploited remotely via specially designed website or file to execute arbitrary code;
- An improper validation vulnerability in the removeField method can be exploited remotely via specially designed website or file to execute arbitrary code;
- An out-of-bounds read vulnerability in the parsing of SOT markers can be exploited remotely via specially designed website or file to obtain sensitive information;
- An out-of-bounds read vulnerability in the parsing of the yTsiz member of SIZ markers can be exploited remotely via specially designed website or file to obtain sensitive information;
Original advisories
Exploitation
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Related products
CVE list
- CVE-2017-14834 high
- CVE-2017-14835 high
- CVE-2017-14836 high
- CVE-2017-14837 high
- CVE-2017-16571 high
- CVE-2017-16572 high
- CVE-2017-16573 warning
- CVE-2017-16574 warning
- CVE-2017-16575 high
- CVE-2017-16576 high
- CVE-2017-16577 high
- CVE-2017-16578 high
- CVE-2017-16579 warning
- CVE-2017-16580 warning
- CVE-2017-16581 high
- CVE-2017-16582 high
- CVE-2017-16583 high
- CVE-2017-16584 warning
- CVE-2017-16585 high
- CVE-2017-16586 high
- CVE-2017-16587 high
- CVE-2017-16588 warning
- CVE-2017-16589 warning
- CVE-2017-10956 warning
- CVE-2017-10957 high
- CVE-2017-10958 high
- CVE-2017-10959 high
- CVE-2017-14818 warning
- CVE-2017-14819 warning
- CVE-2017-14820 warning
- CVE-2017-14821 warning
- CVE-2017-14822 warning
- CVE-2017-14823 high
- CVE-2017-14824 high
- CVE-2017-14825 high
- CVE-2017-14826 high
- CVE-2017-14827 high
- CVE-2017-14828 high
- CVE-2017-14829 high
- CVE-2017-14830 high
- CVE-2017-14831 high
- CVE-2017-14832 high
- CVE-2017-14833 high
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!