Description
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 10.1.3.37598. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the browseForDoc function. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated data structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-13523.
Affected Software
Related
{"id": "CVE-2021-31473", "vendorId": null, "type": "cve", "bulletinFamily": "NVD", "title": "CVE-2021-31473", "description": "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 10.1.3.37598. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the browseForDoc function. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated data structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-13523.", "published": "2021-05-21T15:15:00", "modified": "2021-05-27T13:19:00", "epss": [{"cve": "CVE-2021-31473", "epss": 0.00171, "percentile": 0.52821, "modified": "2023-05-27"}], "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "cvss2": {"cvssV2": {"version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "baseScore": 6.8}, "severity": "MEDIUM", "exploitabilityScore": 8.6, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}, "cvss3": {"cvssV3": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.9}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-31473", "reporter": "zdi-disclosures@trendmicro.com", "references": ["https://www.foxitsoftware.com/support/security-bulletins.php", "https://www.zerodayinitiative.com/advisories/ZDI-21-561/"], "cvelist": ["CVE-2021-31473"], "immutableFields": [], "lastseen": "2023-05-27T14:42:47", "viewCount": 33, "enchantments": {"dependencies": {"references": [{"type": "kaspersky", "idList": ["KLA12166"]}, {"type": "nessus", "idList": ["FOXIT_PHANTOM_10_1_4.NASL", "FOXIT_READER_10_1_4.NASL"]}, {"type": "seebug", "idList": ["SSV:99248"]}, {"type": "zdi", "idList": ["ZDI-21-561"]}], "rev": 4}, "score": {"value": 2.7, "vector": "NONE"}, "backreferences": {"references": [{"type": "kaspersky", "idList": ["KLA12166"]}, {"type": "nessus", "idList": ["FOXIT_PHANTOM_10_1_4.NASL", "FOXIT_READER_10_1_4.NASL"]}, {"type": "seebug", "idList": ["SSV:99248"]}, {"type": "zdi", "idList": ["ZDI-21-561"]}]}, "exploitation": null, "affected_software": {"major_version": [{"name": "foxitsoftware phantompdf", "version": 9}, {"name": "foxitsoftware phantompdf", "version": 10}, {"name": "foxitsoftware reader", "version": 10}]}, "epss": [{"cve": "CVE-2021-31473", "epss": 0.00171, "percentile": 0.52702, "modified": "2023-05-07"}], "vulnersScore": 2.7}, "_state": {"dependencies": 1685211539, "score": 1685200094, "affected_software_major_version": 0, "epss": 0}, "_internal": {"score_hash": "bc5a060f08ccb74cf7d68b077029692f"}, "cna_cvss": {"cna": "Zero Day Initiative", "cvss": {"3": {"vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "score": 7.8}}}, "cpe": ["cpe:/a:foxitsoftware:reader:10.1.3.37598", "cpe:/a:foxitsoftware:phantompdf:10.1.3.37598", "cpe:/a:foxitsoftware:phantompdf:9.7.5.29616"], "cpe23": ["cpe:2.3:a:foxitsoftware:reader:10.1.3.37598:*:*:*:*:*:*:*", "cpe:2.3:a:foxitsoftware:phantompdf:9.7.5.29616:*:*:*:*:*:*:*", "cpe:2.3:a:foxitsoftware:phantompdf:10.1.3.37598:*:*:*:*:*:*:*"], "cwe": ["CWE-787"], "affectedSoftware": [{"cpeName": "foxitsoftware:phantompdf", "version": "9.7.5.29616", "operator": "le", "name": "foxitsoftware phantompdf"}, {"cpeName": "foxitsoftware:phantompdf", "version": "10.1.3.37598", "operator": "le", "name": "foxitsoftware phantompdf"}, {"cpeName": "foxitsoftware:reader", "version": "10.1.3.37598", "operator": "le", "name": "foxitsoftware reader"}], "affectedConfiguration": [{"name": "microsoft windows", "cpeName": "microsoft:windows", "version": "-", "operator": "eq"}], "cpeConfiguration": {"CVE_data_version": "4.0", "nodes": [{"operator": "AND", "children": [{"operator": "OR", "children": [], "cpe_match": [{"vulnerable": true, "cpe23Uri": "cpe:2.3:a:foxitsoftware:phantompdf:9.7.5.29616:*:*:*:*:*:*:*", "versionEndIncluding": "9.7.5.29616", "cpe_name": []}, {"vulnerable": true, "cpe23Uri": "cpe:2.3:a:foxitsoftware:phantompdf:10.1.3.37598:*:*:*:*:*:*:*", "versionStartIncluding": "10.0.0.0", "versionEndIncluding": "10.1.3.37598", "cpe_name": []}, {"vulnerable": true, "cpe23Uri": "cpe:2.3:a:foxitsoftware:reader:10.1.3.37598:*:*:*:*:*:*:*", "versionEndIncluding": "10.1.3.37598", "cpe_name": []}]}, {"operator": "OR", "children": [], "cpe_match": [{"vulnerable": false, "cpe23Uri": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe_name": []}]}], "cpe_match": []}]}, "extraReferences": [{"url": "https://www.foxitsoftware.com/support/security-bulletins.php", "name": "https://www.foxitsoftware.com/support/security-bulletins.php", "refsource": "MISC", "tags": ["Vendor Advisory"]}, {"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-561/", "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-561/", "refsource": "MISC", "tags": ["Third Party Advisory", "VDB Entry"]}], "product_info": [{"vendor": "Foxit", "product": "Reader"}], "solutions": [], "workarounds": [], "impacts": [], "problemTypes": [{"descriptions": [{"cweId": "CWE-787", "description": "CWE-787: Out-of-bounds Write", "lang": "en", "type": "CWE"}]}], "exploits": [], "assigned": "1976-01-01T00:00:00"}
{"prion": [{"lastseen": "2023-08-16T04:53:27", "description": "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 10.1.3.37598. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the browseForDoc function. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated data structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-13523.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2021-05-21T15:15:00", "type": "prion", "title": "CVE-2021-31473", "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-31473"], "modified": "2021-05-27T13:19:00", "id": "PRION:CVE-2021-31473", "href": "https://kb.prio-n.com/vulnerability/CVE-2021-31473", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "zdi": [{"lastseen": "2023-05-27T15:49:35", "description": "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the browseForDoc function. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated data structure. An attacker can leverage this vulnerability to execute code in the context of the current process.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2021-05-11T00:00:00", "type": "zdi", "title": "Foxit Reader browseForDoc Out-Of-Bounds Write Remote Code Execution Vulnerability", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-31473"], "modified": "2021-05-11T00:00:00", "id": "ZDI-21-561", "href": "https://www.zerodayinitiative.com/advisories/ZDI-21-561/", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "seebug": [{"lastseen": "2021-07-24T10:29:58", "description": "", "cvss3": {}, "published": "2021-05-14T00:00:00", "type": "seebug", "title": "Foxit Reader \u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\uff08CVE-2021-31473\uff09", "bulletinFamily": "exploit", "cvss2": {}, "cvelist": ["CVE-2021-31473"], "modified": "2021-05-14T00:00:00", "id": "SSV:99248", "href": "https://www.seebug.org/vuldb/ssvid-99248", "sourceData": "", "sourceHref": "", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "kaspersky": [{"lastseen": "2023-05-27T15:00:57", "description": "### *Detect date*:\n05/06/2021\n\n### *Severity*:\nWarning\n\n### *Description*:\nMultiple vulnerabilities were found in Foxit Reader. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service, obtain sensitive information.\n\n### *Affected products*:\nFoxit Reader earlier than 10.1.4\n\n### *Solution*:\nUpdate to the latest version \n[Download Foxit Reader](<https://www.foxitsoftware.com/downloads/#Foxit-Reader>)\n\n### *Original advisories*:\n[Foxit Security Bulletins](<https://www.foxitsoftware.com/support/security-bulletins.html>) \n\n\n### *Impacts*:\nACE \n\n### *Related products*:\n[Foxit Reader](<https://threats.kaspersky.com/en/product/Foxit-Reader/>)\n\n### *CVE-IDS*:\n[CVE-2021-31458](<https://vulners.com/cve/CVE-2021-31458>)6.8High \n[CVE-2021-31454](<https://vulners.com/cve/CVE-2021-31454>)6.8High \n[CVE-2021-31460](<https://vulners.com/cve/CVE-2021-31460>)6.8High \n[CVE-2021-31456](<https://vulners.com/cve/CVE-2021-31456>)6.8High \n[CVE-2021-31457](<https://vulners.com/cve/CVE-2021-31457>)6.8High \n[CVE-2021-31451](<https://vulners.com/cve/CVE-2021-31451>)6.8High \n[CVE-2021-31459](<https://vulners.com/cve/CVE-2021-31459>)6.8High \n[CVE-2021-21822](<https://vulners.com/cve/CVE-2021-21822>)5.0Critical \n[CVE-2021-31455](<https://vulners.com/cve/CVE-2021-31455>)6.8High \n[CVE-2021-31452](<https://vulners.com/cve/CVE-2021-31452>)6.8High \n[CVE-2021-31453](<https://vulners.com/cve/CVE-2021-31453>)6.8High \n[CVE-2021-31450](<https://vulners.com/cve/CVE-2021-31450>)6.8High \n[CVE-2021-31461](<https://vulners.com/cve/CVE-2021-31461>)5.0Critical \n[CVE-2021-31441](<https://vulners.com/cve/CVE-2021-31441>)6.8High \n[CVE-2021-31473](<https://vulners.com/cve/CVE-2021-31473>)6.8High", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2021-05-06T00:00:00", "type": "kaspersky", "title": "KLA12166 Multiple vulnerabilities in Foxit Reader", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-21822", "CVE-2021-31441", "CVE-2021-31450", "CVE-2021-31451", "CVE-2021-31452", "CVE-2021-31453", "CVE-2021-31454", "CVE-2021-31455", "CVE-2021-31456", "CVE-2021-31457", "CVE-2021-31458", "CVE-2021-31459", "CVE-2021-31460", "CVE-2021-31461", "CVE-2021-31473"], "modified": "2021-05-12T00:00:00", "id": "KLA12166", "href": "https://threats.kaspersky.com/en/vulnerability/KLA12166/", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "nessus": [{"lastseen": "2023-05-21T14:04:19", "description": "According to its version, the Foxit PhantomPDF application (formally known as Phantom) installed on the remote Windows host is prior to 10.1.4. It is, therefore affected by multiple vulnerabilities: Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2021-05-10T00:00:00", "type": "nessus", "title": "Foxit PhantomPDF < 10.1.4 Multiple Vulnerabilities", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2021-21822", "CVE-2021-31441", "CVE-2021-31450", "CVE-2021-31451", "CVE-2021-31452", "CVE-2021-31453", "CVE-2021-31454", "CVE-2021-31455", "CVE-2021-31456", "CVE-2021-31457", "CVE-2021-31458", "CVE-2021-31459", "CVE-2021-31460", "CVE-2021-31461", "CVE-2021-31473", "CVE-2021-31476"], "modified": "2023-03-23T00:00:00", "cpe": ["cpe:/a:foxitsoftware:phantom", "cpe:/a:foxitsoftware:phantompdf"], "id": "FOXIT_PHANTOM_10_1_4.NASL", "href": "https://www.tenable.com/plugins/nessus/149359", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(149359);\n script_version(\"1.12\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/03/23\");\n\n script_cve_id(\n \"CVE-2021-21822\",\n \"CVE-2021-31441\",\n \"CVE-2021-31450\",\n \"CVE-2021-31451\",\n \"CVE-2021-31452\",\n \"CVE-2021-31453\",\n \"CVE-2021-31454\",\n \"CVE-2021-31455\",\n \"CVE-2021-31456\",\n \"CVE-2021-31457\",\n \"CVE-2021-31458\",\n \"CVE-2021-31459\",\n \"CVE-2021-31460\",\n \"CVE-2021-31461\",\n \"CVE-2021-31473\",\n \"CVE-2021-31476\"\n );\n script_xref(name:\"IAVA\", value:\"2021-A-0247-S\");\n script_xref(name:\"IAVA\", value:\"2021-A-0357-S\");\n\n script_name(english:\"Foxit PhantomPDF < 10.1.4 Multiple Vulnerabilities\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"A PDF toolkit installed on the remote Windows host is affected by multiple vulnerabilities\");\n script_set_attribute(attribute:\"description\", value:\n\"According to its version, the Foxit PhantomPDF application (formally known as Phantom) installed on the remote Windows\nhost is prior to 10.1.4. It is, therefore affected by multiple vulnerabilities: Note that Nessus has not tested for this\nissue but has instead relied only on the application's self-reported version number.\");\n # https://www.foxitsoftware.com/support/security-bulletins.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?a27a3e57\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Foxit PhantomPDF version 10.1.4 or later\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-31476\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2021-21822\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/05/06\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/05/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/05/10\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:foxitsoftware:phantom\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:foxitsoftware:phantompdf\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"foxit_phantom_installed.nasl\");\n script_require_keys(\"installed_sw/FoxitPhantomPDF\");\n\n exit(0);\n}\n\ninclude('vcf.inc');\n\napp = 'FoxitPhantomPDF';\n\napp_info = vcf::get_app_info(app:app, win_local:TRUE);\n\nconstraints = [\n { 'max_version' : '10.1.3', 'fixed_version' : '10.1.4' }\n];\n\nvcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_WARNING);\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:28:42", "description": "According to its version, the Foxit Reader application installed on the remote Windows host is prior to 10.1.4. It is, therefore affected by multiple vulnerabilities: Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2021-05-10T00:00:00", "type": "nessus", "title": "Foxit Reader < 10.1.4 Multiple Vulnerabilities", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2021-21822", "CVE-2021-31441", "CVE-2021-31450", "CVE-2021-31451", "CVE-2021-31452", "CVE-2021-31453", "CVE-2021-31454", "CVE-2021-31455", "CVE-2021-31456", "CVE-2021-31457", "CVE-2021-31458", "CVE-2021-31459", "CVE-2021-31460", "CVE-2021-31461", "CVE-2021-31473", "CVE-2021-31476"], "modified": "2023-03-23T00:00:00", "cpe": ["cpe:/a:foxitsoftware:foxit_reader"], "id": "FOXIT_READER_10_1_4.NASL", "href": "https://www.tenable.com/plugins/nessus/149358", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(149358);\n script_version(\"1.12\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/03/23\");\n\n script_cve_id(\n \"CVE-2021-21822\",\n \"CVE-2021-31441\",\n \"CVE-2021-31450\",\n \"CVE-2021-31451\",\n \"CVE-2021-31452\",\n \"CVE-2021-31453\",\n \"CVE-2021-31454\",\n \"CVE-2021-31455\",\n \"CVE-2021-31456\",\n \"CVE-2021-31457\",\n \"CVE-2021-31458\",\n \"CVE-2021-31459\",\n \"CVE-2021-31460\",\n \"CVE-2021-31461\",\n \"CVE-2021-31473\",\n \"CVE-2021-31476\"\n );\n script_xref(name:\"IAVA\", value:\"2021-A-0247-S\");\n script_xref(name:\"IAVA\", value:\"2021-A-0357-S\");\n\n script_name(english:\"Foxit Reader < 10.1.4 Multiple Vulnerabilities\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"A PDF viewer installed on the remote Windows host is affected by multiple vulnerabilities\");\n script_set_attribute(attribute:\"description\", value:\n\"According to its version, the Foxit Reader application installed on the remote Windows host is prior to 10.1.4. It is,\ntherefore affected by multiple vulnerabilities: Note that Nessus has not tested for this issue but has instead relied\nonly on the application's self-reported version number.\");\n # https://www.foxitsoftware.com/support/security-bulletins.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?a27a3e57\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Foxit Reader version 10.1.4 or later\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-31476\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2021-21822\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/05/06\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/05/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/05/10\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:foxitsoftware:foxit_reader\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"foxit_reader_installed.nasl\");\n script_require_keys(\"installed_sw/Foxit Reader\");\n\n exit(0);\n}\n\ninclude('vcf.inc');\n\napp = 'Foxit Reader';\n\napp_info = vcf::get_app_info(app:app, win_local:TRUE);\n\nconstraints = [\n { 'min_version' : '10.0', 'max_version' : '10.1.3.37598', 'fixed_version' : '10.1.4' }\n];\n\nvcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_WARNING);\n", "cvss": {"score": 0.0, "vector": "NONE"}}]}