KLA11314
Multiple vulnerabilities in Foxit Reader

Updated: 06/03/2020
Detect date
?
07/19/2018
Severity
?
Critical
Description

Multiple serious vulnerabilities were found in Foxit Reader. Malicious users can exploit these vulnerabilities to execute arbitrary code and obtain sensitive information.

Below is a complete list of vulnerabilities:

  1. An use-after-free vulnerability in Format event of the ComboBox fields can be exploited remotely via malicious website or file to execute arbitrary code;
  2. An use-after-free vulnerability in the handling of the resetForm method can be exploited remotely via malicious website or file to execute arbitrary code;
  3. An use-after-free vulnerability in the handling of the setFocus method can be exploited remotely via malicious website or file to execute arbitrary code;
  4. Multiple out-of-bounds read vulnerabilities in ConvertToPDF_x86.dll can be exploited remotely via malicious website or file to obtain sensitive information;
  5. An out-of-bounds write vulnerability in ConvertToPDF_x86.dll can be exploited remotely via malicious website or file to execute arbitrary code;
  6. A type confusion vulnerability in the addAdLayer method can be exploited remotely via malicious website or file to execute arbitrary code;
  7. A type confusion vulnerability in the addAnnot method can be exploited remotely via malicious website or file to execute arbitrary code;
  8. A type confusion vulnerability in the addField method can be exploited remotely via malicious website or file to execute arbitrary code;
  9. A type confusion vulnerability in the addPageOpenJSMessage method can be exploited remotely via malicious website or file to execute arbitrary code;
  10. A type confusion vulnerability in the calculateNow method can be exploited remotely via malicious website or file to execute arbitrary code;
  11. A type confusion vulnerability in the closeDoc method can be exploited remotely via malicious website or file to execute arbitrary code;
  12. A type confusion vulnerability in the convertTocPDF method can be exploited remotely via malicious website or file to execute arbitrary code;
  13. A type confusion vulnerability in the exportAsFDF method can be exploited remotely via malicious website or file to execute arbitrary code;
  14. A type confusion vulnerability in the exportAsXFDF method can be exploited remotely via malicious website or file to execute arbitrary code;
  15. A type confusion vulnerability in the exportDataObject method can be exploited remotely via malicious website or file to execute arbitrary code;
  16. A type confusion vulnerability in the getAnnot method can be exploited remotely via malicious website or file to execute arbitrary code;
  17. A type confusion vulnerability in the getDataBObject method can be exploited remotely via malicious website or file to execute arbitrary code;
  18. A type confusion vulnerability in the getField method can be exploited remotely via malicious website or file to execute arbitrary code;
  19. A type confusion vulnerability in the getIcon method can be exploited remotely via malicious website or file to execute arbitrary code;
  20. A type confusion vulnerability in the getLinks method can be exploited remotely via malicious website or file to execute arbitrary code;
  21. A type confusion vulnerability in the getNthFieldName method can be exploited remotely via malicious website or file to execute arbitrary code;
  22. A type confusion vulnerability in the getOCGs method can be exploited remotely via malicious website or file to execute arbitrary code;
  23. A type confusion vulnerability in the getPageBox method can be exploited remotely via malicious website or file to execute arbitrary code;
  24. A type confusion vulnerability in the getPageNthWord method can be exploited remotely via malicious website or file to execute arbitrary code;
  25. A type confusion vulnerability in the getPageNthWordQuads method can be exploited remotely via malicious website or file to execute arbitrary code;
  26. A type confusion vulnerability in the getPageRotation method can be exploited remotely via malicious website or file to execute arbitrary code;
  27. A type confusion vulnerability in the getTemplate method can be exploited remotely via malicious website or file to execute arbitrary code;
  28. A type confusion vulnerability in the getURL method can be exploited remotely via malicious website or file to execute arbitrary code;
  29. A type confusion vulnerability in the getVersionID method can be exploited remotely via malicious website or file to execute arbitrary code;
  30. A type confusion vulnerability in the importAnFDF method can be exploited remotely via malicious website or file to execute arbitrary code;
  31. A type confusion vulnerability in the importAnXFDX method can be exploited remotely via malicious website or file to execute arbitrary code;
  32. A type confusion vulnerability in the importDataObject method can be exploited remotely via malicious website or file to execute arbitrary code;
  33. A type confusion vulnerability in the importTextData method can be exploited remotely via malicious website or file to execute arbitrary code;
  34. A type confusion vulnerability in the mailForm method can be exploited remotely via malicious website or file to execute arbitrary code;
  35. A type confusion vulnerability in the print method can be exploited remotely via malicious website or file to execute arbitrary code;
  36. A type confusion vulnerability in the removeDataObject method can be exploited remotely via malicious website or file to execute arbitrary code;
  37. A type confusion vulnerability in the removeField method can be exploited remotely via malicious website or file to execute arbitrary code;
  38. A type confusion vulnerability in the removeIcon method can be exploited remotely via malicious website or file to execute arbitrary code;
  39. A type confusion vulnerability in the removeTemplate method can be exploited remotely via malicious website or file to execute arbitrary code;
  40. A type confusion vulnerability in the scroll method can be exploited remotely via malicious website or file to execute arbitrary code;
  41. A type confusion vulnerability in the spawnPageFromTemplate method can be exploited remotely via malicious website or file to execute arbitrary code;
  42. A type confusion vulnerability in the submitForm method can be exploited remotely via malicious website or file to execute arbitrary code;
  43. A type confusion vulnerability in the mailDoc method can be exploited remotely via malicious website or file to execute arbitrary code;
  44. A type confusion vulnerability in the getPageNumWords method can be exploited remotely via malicious website or file to execute arbitrary code;
  45. A type confusion vulnerability in the resetForm method can be exploited remotely via malicious website or file to execute arbitrary code;
  46. An arbitrary file write vulnerability in the exportAsFDF XFA function can be exploited remotely via malicious website or file to execute arbitrary code;
  47. An arbitrary file write vulnerability in the exportData XFA function can be exploited remotely via malicious website or file to execute arbitrary code;
  48. An uninitialized pointer vulnerability in the handling of FlateDecode streams can be exploited remotely via malicious website or file to execute arbitrary code;
  49. An use-after-free vulnerability in the highlightMode attribute can be exploited remotely via malicious website or file to execute arbitrary code;
  50. An use-after-free vulnerability in the handling of the newDoc function can be exploited remotely via malicious website or file to execute arbitrary code;
  51. A type confusion vulnerability in the handling of the oneOfChild attribute can be exploited remotely via malicious website or file to execute arbitrary code;
  52. A type confusion vulnerability in the handling of arguments passed to the mailDoc function can be exploited remotely via malicious website or file to execute arbitrary code;
  53. A type confusion vulnerability in the handling of arguments passed to the instanceManager.nodes.append function can be exploited remotely via malicious website or file to execute arbitrary code;
  54. A type confusion vulnerability in the handling of arguments passed to the setFocus function can be exploited remotely via malicious website or file to execute arbitrary code;
  55. An out-of-bound read vulnerability in the parsing of PDF documents can be exploited remotely via malicious website or file to obtain sensitive information;
  56. A heap-based buffer overflow vulnerability in the parsing of PDF documents can be exploited remotely via malicious website or file to execute arbitrary code;
  57. An use-after-free vulnerability in the addAnnot function while parsing of PDF documents can be exploited remotely via malicious website or file to execute arbitrary code;
  58. An use-after-free vulnerability in the createTemplate function while parsing of PDF documents can be exploited remotely via malicious website or file to execute arbitrary code;
  59. An use-after-free vulnerability in the setAction function while parsing of PDF documents can be exploited remotely via malicious website or file to execute arbitrary code;
  60. An use-after-free vulnerability in the processing of FileAttachment annotations can be exploited remotely via malicious website or file to execute arbitrary code;
  61. An integer overflow vulnerability in the handling of PDF documents can be exploited remotely via malicious website or file to execute arbitrary code;
  62. An use-after-free vulnerability in the borderEffectStyle function while processing of Circle annotations can be exploited remotely via malicious website or file to execute arbitrary code;
  63. An use-after-free vulnerability in the processing of FreeText annotations can be exploited remotely via malicious website or file to execute arbitrary code;
  64. An use-after-free vulnerability in the processing of Ink annotations can be exploited remotely via malicious website or file to execute arbitrary code;
  65. An use-after-free vulnerability in the processing of Line annotations can be exploited remotely via malicious website or file to execute arbitrary code;
  66. An use-after-free vulnerability inthe processing of Polygon annotations can be exploited remotely via malicious website or file to execute arbitrary code;
  67. An use-after-free vulnerability in the processing of Sound annotations can be exploited remotely via malicious website or file to execute arbitrary code;
  68. An use-after-free vulnerability in the processing of Square annotations can be exploited remotely via malicious website or file to execute arbitrary code;
  69. An use-after-free vulnerability in the processing of StrikeOut annotations can be exploited remotely via malicious website or file to execute arbitrary code;
  70. An use-after-free vulnerability in the processing of Text annotations can be exploited remotely via malicious website or file to execute arbitrary code;
  71. An use-after-free vulnerability in the processing of PolyLine annotations can be exploited remotely via malicious website or file to execute arbitrary code;
  72. An use-after-free vulnerability in the processing of button objects can be exploited remotely via malicious website or file to execute arbitrary code;
  73. An use-after-free vulnerability in the processing of Link objects can be exploited remotely via malicious website or file to execute arbitrary code;
  74. An use-after-free vulnerability in the handling of the valueAsString function can be exploited remotely via malicious website or file to execute arbitrary code;
  75. An use-after-free vulnerability in the handling of the SeedValue Generic Object parameter provided to the signatureSetSeedValue function can be exploited remotely via malicious website or file to execute arbitrary code;
  76. An use-after-free vulnerability in the handling of events can be exploited remotely via malicious website or file to execute arbitrary code;
  77. A type confussion vulnerability in the handling of XFA events can be exploited remotely via malicious website or file to execute arbitrary code;
  78. An use-after-free vulnerability in the handling of the exportAsFDF function can be exploited remotely via malicious website or file to execute arbitrary code;
  79. A type confusion vulnerability in the handling of PDF files can be exploited remotely via malicious website or file to execute arbitrary code;
  80. Multiple use-after-free vulnerabilities in the handling of annotations can be exploited remotely via malicious website or file to execute arbitrary code;
  81. An out-of-bounds read vulnerability in the processing of PDF documents can be exploited remotely via malicious website or file to obtain sensitive information;
  82. Multiple type confusion vulnerabilities in the processing of PDF documents can be exploited remotely via malicious website or file to execute arbitrary code;
  83. Multiple use-after-free vulnerabilities in the the JavaScript engine can be exploited remotely via malicious website or file to execute arbitrary code;
Affected products

Foxit Reader earlier than 9.2.0.9097
Foxit PhantomPDF earlier than 9.2.0.9097

Solution

Update to the latest version
Download Foxit Reader
Download Foxit PhantomPDF

Original advisories

Security updates available in Foxit Reader 9.2 and Foxit PhantomPDF 9.2

Impacts
?
ACE 
[?]

OSI 
[?]
Related products
Foxit Reader
Foxit Phantom PDF
CVE-IDS
?
CVE-2018-116176.8High
CVE-2018-116186.8High
CVE-2018-116196.8High
CVE-2018-116204.3Warning
CVE-2018-116214.3Warning
CVE-2018-116226.8High
CVE-2018-116236.8High
CVE-2018-142416.8High
CVE-2018-142426.8High
CVE-2018-142436.8High
CVE-2018-142446.8High
CVE-2018-142456.8High
CVE-2018-142466.8High
CVE-2018-142476.8High
CVE-2018-142486.8High
CVE-2018-142496.8High
CVE-2018-142506.8High
CVE-2018-142516.8High
CVE-2018-142526.8High
CVE-2018-142536.8High
CVE-2018-142546.8High
CVE-2018-142556.8High
CVE-2018-142566.8High
CVE-2018-142576.8High
CVE-2018-142586.8High
CVE-2018-142596.8High
CVE-2018-142606.8High
CVE-2018-142616.8High
CVE-2018-142626.8High
CVE-2018-142636.8High
CVE-2018-142646.8High
CVE-2018-142656.8High
CVE-2018-142666.8High
CVE-2018-142676.8High
CVE-2018-142686.8High
CVE-2018-142696.8High
CVE-2018-142706.8High
CVE-2018-142716.8High
CVE-2018-142726.8High
CVE-2018-142736.8High
CVE-2018-142746.8High
CVE-2018-142756.8High
CVE-2018-142766.8High
CVE-2018-142776.8High
CVE-2018-142786.8High
CVE-2018-142796.8High
CVE-2018-142806.8High
CVE-2018-142816.8High
CVE-2018-142826.8High
CVE-2018-142836.8High
CVE-2018-142846.8High
CVE-2018-142856.8High
CVE-2018-142866.8High
CVE-2018-142876.8High
CVE-2018-142886.8High
CVE-2018-142894.3Warning
CVE-2018-142906.8High
CVE-2018-142916.8High
CVE-2018-142926.8High
CVE-2018-142936.8High
CVE-2018-142946.8High
CVE-2018-142956.8High
CVE-2018-142966.8High
CVE-2018-142976.8High
CVE-2018-142986.8High
CVE-2018-142996.8High
CVE-2018-143006.8High
CVE-2018-143016.8High
CVE-2018-143026.8High
CVE-2018-143036.8High
CVE-2018-143046.8High
CVE-2018-143056.8High
CVE-2018-143066.8High
CVE-2018-143076.8High
CVE-2018-143086.8High
CVE-2018-143096.8High
CVE-2018-143106.8High
CVE-2018-143116.8High
CVE-2018-143126.8High
CVE-2018-143136.8High
CVE-2018-143146.8High
CVE-2018-143156.8High
CVE-2018-143164.3Warning
CVE-2018-143176.8High
CVE-2018-39246.8High
CVE-2018-39396.8High
Find out the statistics of the vulnerabilities spreading in your region