Foxit Reader Multiple Vulnerabilities
RISK: Medium Risk
Multiple vulnerabilities have been identified in Foxit Reader, which could be exploited by attackers to compromise a vulnerable system.
1. A stack overflow error when processing a PDF containing an action (e.g. Open/Execute a file) with an overly long filename argument, which could be exploited to crash an affected application or execute arbitrary code.
2. An error when processing JBIG2 symbol dictionary segments, which could be exploited to dereference uninitialised memory via a specially crafted PDF file.
3. An error when processing an Open/Execute a file action defined in a PDF file, which could cause the application to open/execute the file defined by the creator of the PDF file without asking the user for confirmation when the trigger condition is satisfied.
Impact
- Denial of Service
- Remote Code Execution
- Security Restriction Bypass
System / Technologies affected
- Foxit Reader version 3.0 and prior
- Foxit Reader version 2.3 and prior
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
- Upgrade to version 3.0 Build 1506 or 2.3 Build 3902 :
http://www.foxitsoftware.com/downloads/
Vulnerability Identifier
Source
Related Link
Share with