Multiple serious vulnerabilities were found in Foxit Reader. Malicious users can exploit these vulnerabilities to execute arbitrary code and obtain sensitive information.
Below is a complete list of vulnerabilities:
- An use-after-free vulnerability in Format event of the ComboBox fields can be exploited remotely via malicious website or file to execute arbitrary code;
- An use-after-free vulnerability in the handling of the resetForm method can be exploited remotely via malicious website or file to execute arbitrary code;
- An use-after-free vulnerability in the handling of the setFocus method can be exploited remotely via malicious website or file to execute arbitrary code;
- Multiple out-of-bounds read vulnerabilities in ConvertToPDF_x86.dll can be exploited remotely via malicious website or file to obtain sensitive information;
- An out-of-bounds write vulnerability in ConvertToPDF_x86.dll can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the addAdLayer method can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the addAnnot method can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the addField method can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the addPageOpenJSMessage method can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the calculateNow method can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the closeDoc method can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the convertTocPDF method can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the exportAsFDF method can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the exportAsXFDF method can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the exportDataObject method can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the getAnnot method can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the getDataBObject method can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the getField method can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the getIcon method can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the getLinks method can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the getNthFieldName method can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the getOCGs method can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the getPageBox method can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the getPageNthWord method can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the getPageNthWordQuads method can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the getPageRotation method can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the getTemplate method can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the getURL method can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the getVersionID method can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the importAnFDF method can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the importAnXFDX method can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the importDataObject method can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the importTextData method can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the mailForm method can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the print method can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the removeDataObject method can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the removeField method can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the removeIcon method can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the removeTemplate method can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the scroll method can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the spawnPageFromTemplate method can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the submitForm method can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the mailDoc method can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the getPageNumWords method can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the resetForm method can be exploited remotely via malicious website or file to execute arbitrary code;
- An arbitrary file write vulnerability in the exportAsFDF XFA function can be exploited remotely via malicious website or file to execute arbitrary code;
- An arbitrary file write vulnerability in the exportData XFA function can be exploited remotely via malicious website or file to execute arbitrary code;
- An uninitialized pointer vulnerability in the handling of FlateDecode streams can be exploited remotely via malicious website or file to execute arbitrary code;
- An use-after-free vulnerability in the highlightMode attribute can be exploited remotely via malicious website or file to execute arbitrary code;
- An use-after-free vulnerability in the handling of the newDoc function can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the handling of the oneOfChild attribute can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the handling of arguments passed to the mailDoc function can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the handling of arguments passed to the instanceManager.nodes.append function can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the handling of arguments passed to the setFocus function can be exploited remotely via malicious website or file to execute arbitrary code;
- An out-of-bound read vulnerability in the parsing of PDF documents can be exploited remotely via malicious website or file to obtain sensitive information;
- A heap-based buffer overflow vulnerability in the parsing of PDF documents can be exploited remotely via malicious website or file to execute arbitrary code;
- An use-after-free vulnerability in the addAnnot function while parsing of PDF documents can be exploited remotely via malicious website or file to execute arbitrary code;
- An use-after-free vulnerability in the createTemplate function while parsing of PDF documents can be exploited remotely via malicious website or file to execute arbitrary code;
- An use-after-free vulnerability in the setAction function while parsing of PDF documents can be exploited remotely via malicious website or file to execute arbitrary code;
- An use-after-free vulnerability in the processing of FileAttachment annotations can be exploited remotely via malicious website or file to execute arbitrary code;
- An integer overflow vulnerability in the handling of PDF documents can be exploited remotely via malicious website or file to execute arbitrary code;
- An use-after-free vulnerability in the borderEffectStyle function while processing of Circle annotations can be exploited remotely via malicious website or file to execute arbitrary code;
- An use-after-free vulnerability in the processing of FreeText annotations can be exploited remotely via malicious website or file to execute arbitrary code;
- An use-after-free vulnerability in the processing of Ink annotations can be exploited remotely via malicious website or file to execute arbitrary code;
- An use-after-free vulnerability in the processing of Line annotations can be exploited remotely via malicious website or file to execute arbitrary code;
- An use-after-free vulnerability inthe processing of Polygon annotations can be exploited remotely via malicious website or file to execute arbitrary code;
- An use-after-free vulnerability in the processing of Sound annotations can be exploited remotely via malicious website or file to execute arbitrary code;
- An use-after-free vulnerability in the processing of Square annotations can be exploited remotely via malicious website or file to execute arbitrary code;
- An use-after-free vulnerability in the processing of StrikeOut annotations can be exploited remotely via malicious website or file to execute arbitrary code;
- An use-after-free vulnerability in the processing of Text annotations can be exploited remotely via malicious website or file to execute arbitrary code;
- An use-after-free vulnerability in the processing of PolyLine annotations can be exploited remotely via malicious website or file to execute arbitrary code;
- An use-after-free vulnerability in the processing of button objects can be exploited remotely via malicious website or file to execute arbitrary code;
- An use-after-free vulnerability in the processing of Link objects can be exploited remotely via malicious website or file to execute arbitrary code;
- An use-after-free vulnerability in the handling of the valueAsString function can be exploited remotely via malicious website or file to execute arbitrary code;
- An use-after-free vulnerability in the handling of the SeedValue Generic Object parameter provided to the signatureSetSeedValue function can be exploited remotely via malicious website or file to execute arbitrary code;
- An use-after-free vulnerability in the handling of events can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confussion vulnerability in the handling of XFA events can be exploited remotely via malicious website or file to execute arbitrary code;
- An use-after-free vulnerability in the handling of the exportAsFDF function can be exploited remotely via malicious website or file to execute arbitrary code;
- A type confusion vulnerability in the handling of PDF files can be exploited remotely via malicious website or file to execute arbitrary code;
- Multiple use-after-free vulnerabilities in the handling of annotations can be exploited remotely via malicious website or file to execute arbitrary code;
- An out-of-bounds read vulnerability in the processing of PDF documents can be exploited remotely via malicious website or file to obtain sensitive information;
- Multiple type confusion vulnerabilities in the processing of PDF documents can be exploited remotely via malicious website or file to execute arbitrary code;
- Multiple use-after-free vulnerabilities in the the JavaScript engine can be exploited remotely via malicious website or file to execute arbitrary code;
|