Kaspersky ID:
KLA10891
Дата обнаружения:
18/10/2016
Обновлено:
22/01/2024

Описание

Multiple serious vulnerabilities have been found in Foxit Reader. Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code or obtain sensitive information.

Below is a complete list of vulnerabilities

  1. Heap corruption at thumbnail shell extension plugin can be exploited remotely to cause denial of service via a specially designed PDF document;
  2. Multiple out of bounds read/write vulnerabilities can be exploited remotely to execute arbitrary code via a specially designed PDF document;
  3. Out of bounds read at ConvertToPDF plugin can be exploited remotely to cause denial of service via a specially designed TIFF image.

Technical details

Vulnerability (1) related to FoxitThumbnailHndlr_x86.dll and can be exploited via a specially designed JPEG2000 image embedded in a PDF document.

Vulnerabilities under point (2):

— can be triggered when gflags app is enabled and can be exploited via a specially designed BMP or TIFF image embedded in the XFA stream in a PDF document.

— can be exploited via a specially designed JPEG2000 image embedded in a PDF document.

Vulnerability (3) can be triggered when gflags app is enabled.

Первичный источник обнаружения

Связанные продукты

Список CVE

  • CVE-2016-8879
    warning
  • CVE-2016-8878
    high
  • CVE-2016-8877
    high
  • CVE-2016-8876
    high
  • CVE-2016-8875
    warning

Смотрите также

Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com

Нашли неточность в описании этой уязвимости? Дайте нам знать!
Kaspersky IT Security Calculator:
Оцените ваш профиль кибербезопасности
Узнать больше
Встречай новый Kaspersky!
Каждая минута твоей онлайн-жизни заслуживает топовой защиты.
Узнать больше
Confirm changes?
Your message has been sent successfully.