Lucene search

K
certCERTVU:119747
HistoryMay 27, 2008 - 12:00 a.m.

Foxit Reader buffer overflow vulnerability

2008-05-2700:00:00
www.kb.cert.org
8

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.166 Low

EPSS

Percentile

96.0%

Overview

Foxit Reader contains a buffer overflow vulnerability that may allow an attacker to execute arbitrary code.

Description

Foxit Reader is a PDF reader that is available on multiple operating systems.

From the Secuia Research advisory Foxit Reader "util.printf()" Buffer Overflow:
S__ecunia Research has discovered a vulnerability in Foxit Reader, which can be exploited by malicious people to compromise a user’s system.
_
The vulnerability is caused due to a boundary error when parsing format strings containing a floating point specifier in the β€œutil.printf()” JavaScript function. This can be exploited to cause a stack-based buffer overflow via a specially crafted PDF file.

_
To exploit this vulnerability an attacker would have to persuade a user to open a specially crafted PDF file. The malicious PDF could be hosted on a web page or sent via email.


Impact

A remote, unauthenticated attacker may be able to execute arbitrary code.


Solution

Foxit Reader version 2.3 build 2912 was released to address this issue.


Do not open untrusted PDF files

Do not open unfamiliar or unexpected PDF attachments. Users can convert PDF documents to text or HTML by using search engine features or other hosted PDF rendering services.


Vendor Information

119747

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Foxit Software Company Affected

Updated: May 27, 2008

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This vulnerability was published by Dyon Balding from Secunia Research.

This document was written by Ryan Giobbi.

Other Information

CVE IDs: CVE-2008-1104
Severity Metric: 1.69 Date Public:

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.166 Low

EPSS

Percentile

96.0%