Skip to main content

Foxit Reader Multiple Vulnerabilities

Last Update Date: 28 Jan 2011 Release Date: 10 Mar 2009 4842 Views

RISK: Medium Risk

Multiple vulnerabilities have been identified in Foxit Reader, which could be exploited by attackers to compromise a vulnerable system.

1. A stack overflow error when processing a PDF containing an action (e.g. Open/Execute a file) with an overly long filename argument, which could be exploited to crash an affected application or execute arbitrary code.

2. An error when processing JBIG2 symbol dictionary segments, which could be exploited to dereference uninitialised memory via a specially crafted PDF file.

3. An error when processing an Open/Execute a file action defined in a PDF file, which could cause the application to open/execute the file defined by the creator of the PDF file without asking the user for confirmation when the trigger condition is satisfied.


Impact

  • Denial of Service
  • Remote Code Execution
  • Security Restriction Bypass

System / Technologies affected

  • Foxit Reader version 3.0 and prior
  • Foxit Reader version 2.3 and prior

Solutions

Before installation of the software, please visit the software manufacturer web-site for more details.


Vulnerability Identifier


Source


Related Link