KLA10891
Multiple vulnerabilities in Foxit Reader

Обновлено: 03/06/2020
Дата обнаружения
18/10/2016
Уровень угрозы
High
Описание

Multiple serious vulnerabilities have been found in Foxit Reader. Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code or obtain sensitive information.

Below is a complete list of vulnerabilities

  1. Heap corruption at thumbnail shell extension plugin can be exploited remotely to cause denial of service via a specially designed PDF document;
  2. Multiple out of bounds read/write vulnerabilities can be exploited remotely to execute arbitrary code via a specially designed PDF document;
  3. Out of bounds read at ConvertToPDF plugin can be exploited remotely to cause denial of service via a specially designed TIFF image.

Technical details

Vulnerability (1) related to FoxitThumbnailHndlr_x86.dll and can be exploited via a specially designed JPEG2000 image embedded in a PDF document.

Vulnerabilities under point (2):

— can be triggered when gflags app is enabled and can be exploited via a specially designed BMP or TIFF image embedded in the XFA stream in a PDF document.

— can be exploited via a specially designed JPEG2000 image embedded in a PDF document.

Vulnerability (3) can be triggered when gflags app is enabled.

Пораженные продукты

Foxit Reader versions earlier than 8.1

Решение

Update to the latest version
Foxit Reader download page

Первичный источник обнаружения
Foxit Software security bulletins page
Оказываемое влияние
?
ACE 
[?]

OSI 
[?]

DoS 
[?]
Связанные продукты
Foxit Reader
CVE-IDS
Узнай статистику распространения уязвимостей в твоем регионе