Lucene search

K
kasperskyKaspersky LabKLA11326
HistorySep 28, 2018 - 12:00 a.m.

KLA11326 Multiple vulnerabilities in Foxit Reader

2018-09-2800:00:00
Kaspersky Lab
threats.kaspersky.com
482

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.7 High

AI Score

Confidence

High

0.014 Low

EPSS

Percentile

86.6%

Multiple serious vulnerabilities were found in Foxit Reader. Malicious users can exploit these vulnerabilities to execute arbitrary code, obtain sensitive information. Below is a complete list of vulnerabilities:

  1. Multiple out-of-bounds Access/Write/Read vulnerabilities releted to parsing non-integer strings during the conversion of HTML files to PDFs can be exploited remotely to execute arbitrary code;
  2. Multiple Use-After-Free vulnerabilities releted to parsing non-integer strings during the conversion of HTML files to PDFs can be exploited remotely to execute arbitrary code;
  3. Multiple out-of-bounds read vulnerabilities in the closeDoc function can be exploited remotely to execute arbitrary code;
  4. Multiple Use-After-Free vulnerabilities can be exploited remotely to execute arbitrary code;
  5. Multiple Use-After-Free vulnerabilities related to XFA layout can be exploited remotely to execute arbitrary code;
  6. Multiple Use-After-Free vulnerabilities releted to processing malicious PDF documents or certain properties of a PDF form can be exploited remotely to execute arbitrary code;
  7. An unspecified vulnerability can be exploited remotely to obtain sensitive information;
  8. A memory corruption vulnerability related to pageIndex object can be exploited to obtain sensitive information;
  9. A Out-of-Bounds Read vulnerability in the Lower method can be exploited to obtain sensitive information;
  10. A type confusion vulnerability can be exploited remotely to execute arbitrary code;
  11. An Out-of-Bounds Read vulnerability releted to processing a PDF file can be exploited remotely to obtain sensitive information.

Technical details

(7) allow remote attackers to trigger Uninitialized Object Information Disclosure.

Original advisories

Security updates available in Foxit Reader 9.3 and Foxit PhantomPDF 9.3

Related products

Foxit-Reader

Foxit-Phantom-PDF

CVE list

CVE-2018-3940 high

CVE-2018-3941 high

CVE-2018-3942 high

CVE-2018-3943 high

CVE-2018-3944 high

CVE-2018-3945 high

CVE-2018-3946 high

CVE-2018-3957 high

CVE-2018-3962 high

CVE-2018-3958 high

CVE-2018-3959 high

CVE-2018-3960 high

CVE-2018-3961 high

CVE-2018-3964 high

CVE-2018-3965 high

CVE-2018-3966 high

CVE-2018-3967 high

Solution

Update to the latest versionDownload Foxit Reader

Download Foxit PhantomPDF

Impacts

  • ACE

Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.

  • OSI

Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.

  • DoS

Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.

  • SB

Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.

Affected Products

  • Foxit Reader 9.2.0.9297 and earlierFoxit PhantomPDF 9.2.0.9297 and earlier

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.7 High

AI Score

Confidence

High

0.014 Low

EPSS

Percentile

86.6%