Lucene search

K
openvasCopyright (C) 2023 Greenbone AGOPENVAS:1361412562310826901
HistoryJan 30, 2023 - 12:00 a.m.

Foxit Reader < 12.0.2 Multiple Vulnerabilities (Jan 2023)

2023-01-3000:00:00
Copyright (C) 2023 Greenbone AG
plugins.openvas.org
3
pdf
javascript engine
u3d files
arbitrary code execution
windows
update
vendorfix
security bulletins
greenbone ag

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

5.7

Confidence

High

EPSS

0.005

Percentile

76.1%

Foxit Reader is prone to multiple vulnerabilities.

# SPDX-FileCopyrightText: 2023 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

CPE = "cpe:/a:foxitsoftware:reader";

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.826901");
  script_version("2024-02-23T14:36:45+0000");
  script_cve_id("CVE-2022-32774", "CVE-2022-37332", "CVE-2022-38097", "CVE-2022-40129",
                "CVE-2022-43637", "CVE-2022-43638", "CVE-2022-43639", "CVE-2022-43640",
                "CVE-2022-43641");
  script_tag(name:"cvss_base", value:"7.2");
  script_tag(name:"cvss_base_vector", value:"AV:L/AC:L/Au:N/C:C/I:C/A:C");
  script_tag(name:"last_modification", value:"2024-02-23 14:36:45 +0000 (Fri, 23 Feb 2024)");
  script_tag(name:"severity_vector", value:"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H");
  script_tag(name:"severity_origin", value:"NVD");
  script_tag(name:"severity_date", value:"2023-04-06 18:37:00 +0000 (Thu, 06 Apr 2023)");
  script_tag(name:"creation_date", value:"2023-01-30 17:08:32 +0530 (Mon, 30 Jan 2023)");
  script_name("Foxit Reader < 12.0.2 Multiple Vulnerabilities (Jan 2023)");

  script_tag(name:"summary", value:"Foxit Reader is prone to multiple vulnerabilities.");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on
  the target host.");

  script_tag(name:"insight", value:"Multiple flaws exist due to,

  - Multiple use-after-free vulnerabilities exist in the JavaScript engine of
    Foxit Software's PDF Reader.

  - The flaws exist within the parsing of U3D files. The issue results from the
    lack of validating the existence of an object prior to performing operations on
    the object.");

  script_tag(name:"impact", value:"Successful exploitation allow attackers
  to conduct arbitrary code execution.");

  script_tag(name:"affected", value:"Foxit Reader version 12.0.1.12430 and earlier
  on Windows.");

  script_tag(name:"solution", value:"Update to version 12.0.2 or later.");

  script_tag(name:"solution_type", value:"VendorFix");
  script_tag(name:"qod_type", value:"registry");
  script_xref(name:"URL", value:"https://www.foxitsoftware.com/support/security-bulletins.php");

  script_copyright("Copyright (C) 2023 Greenbone AG");
  script_category(ACT_GATHER_INFO);
  script_family("General");
  script_dependencies("gb_foxit_reader_detect_portable_win.nasl");
  script_mandatory_keys("foxit/reader/ver");
  exit(0);
}

include("host_details.inc");
include("version_func.inc");

if(!infos = get_app_version_and_location(cpe:CPE, exit_no_version:TRUE))
  exit(0);

version = infos["version"];
location = infos["location"];

if(version_is_less(version:version, test_version:"12.0.2")) {
  report = report_fixed_ver(installed_version:version, fixed_version:"12.0.2", install_path:location);
  security_message(data:report);
  exit(0);
}

exit(99);

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

5.7

Confidence

High

EPSS

0.005

Percentile

76.1%