Lucene search

K
openvasCopyright (C) 2024 Greenbone AGOPENVAS:1361412562310834432
HistoryAug 22, 2024 - 12:00 a.m.

Foxit Reader Multiple Vulnerabilities (Aug 2024) - Windows

2024-08-2200:00:00
Copyright (C) 2024 Greenbone AG
plugins.openvas.org
4
foxit reader
multiple vulnerabilities
cve-2024-7722
cve-2024-7723
cve-2024-7724
cve-2024-7725
use-after-free
information disclosure
remote code execution
windows
update

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

5.7

Confidence

High

Foxit Reader is prone to multiple
vulnerabilities.

# SPDX-FileCopyrightText: 2024 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

CPE = "cpe:/a:foxitsoftware:reader";

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.834432");
  script_version("2024-08-28T05:05:33+0000");
  script_cve_id("CVE-2024-7722", "CVE-2024-7723", "CVE-2024-7724", "CVE-2024-7725");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:C/I:C/A:C");
  script_tag(name:"last_modification", value:"2024-08-28 05:05:33 +0000 (Wed, 28 Aug 2024)");
  script_tag(name:"creation_date", value:"2024-08-22 16:12:56 +0530 (Thu, 22 Aug 2024)");
  script_name("Foxit Reader Multiple Vulnerabilities (Aug 2024) - Windows");

  script_tag(name:"summary", value:"Foxit Reader is prone to multiple
  vulnerabilities.");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present
  on the target host.");

  script_tag(name:"insight", value:"These vulnerabilities exist:

  - CVE-2024-7722: use-after-free information disclosure vulnerability

  - CVE-2024-7723: use-after-free remote code execution vulnerability

  - CVE-2024-7724: use-after-free remote code execution vulnerability

  - CVE-2024-7725: use-after-free remote code execution vulnerability");

  script_tag(name:"impact", value:"Successful exploitation allows an attacker
  to execute remote code and disclose information.");

  script_tag(name:"affected", value:"Foxit Reader version 2024.2.2.25170 and
  prior on Windows.");

  script_tag(name:"solution", value:"Update to version 2024.2.3 or later.");

  script_tag(name:"solution_type", value:"VendorFix");
  script_tag(name:"qod_type", value:"registry");
  script_xref(name:"URL", value:"https://www.foxitsoftware.com/support/security-bulletins.php");
  script_copyright("Copyright (C) 2024 Greenbone AG");
  script_category(ACT_GATHER_INFO);
  script_family("General");
  script_dependencies("gb_foxit_reader_detect_portable_win.nasl");
  script_mandatory_keys("foxit/reader/ver");
  exit(0);
}

include("host_details.inc");
include("version_func.inc");

if(!infos = get_app_version_and_location(cpe:CPE, exit_no_version:TRUE)) exit(0);

vers = infos["version"];
path = infos["location"];

if(version_is_less(version:vers, test_version:"2024.2.3")) {
  report = report_fixed_ver(installed_version:vers, fixed_version:"2024.2.3", install_path:path);
  security_message(port:0, data:report);
  exit(0);
}

exit(99);

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

5.7

Confidence

High

Related for OPENVAS:1361412562310834432