Foxit Reader - COM Objects Memory Corruption Remote Code Execution Vulnerability

2009-11-19T00:00:00
ID EDB-ID:10204
Type exploitdb
Reporter mrx
Modified 2009-11-19T00:00:00

Description

Foxit Reader COM Objects Memory Corruption Remote Code Execution Vulnerability. Dos exploit for windows platform

                                        
                                            Bugtraq ID: 36673

Published: Oct 14 2009 12:00AM
Updated: Nov 19 2009 03:25PM
Credit: mrx
Vulnerable: Foxit Reader 3.1.1 Build 0928
Foxit Foxit Reader 3.0.2009 1301
Foxit Foxit Reader 3.0 Build 1817
Foxit Foxit Reader 3.0 Build 1506
Foxit Foxit Reader 3.0


Foxit Reader is prone to a remote code-execution vulnerability because is fails to properly handle certain COM objects.

An attacker can exploit this issue by supplying a malicious PDF file or webpage. Successful exploits may allow the attacker to execute arbitrary code in the context of a user running the affected application. Failed attempts will likely result in denial-of-service conditions. 

Exploit-DB mirror: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/10204.tar (2009-11-22-36668.tar)