Beschreibung: | Summary: Foxit Reader is prone to multiple vulnerabilities.
Vulnerability Insight: Multiple flaws exist due to:
- An error where the application passes an insufficiently qualified path in loading an external library when a user launches the application.
- A heap buffer overflow error.
- Multiple use-after-free errors.
- The use of uninitialized new 'Uint32Array' object or member variables in 'PrintParams' or 'm_pCurContex' objects.
- An incorrect memory allocation, memory commit, memory access, or array access.
- Type Confusion errors.
- An error in 'GoToE' & 'GoToR' Actions.
- An out-of-bounds read error in the '_JP2_Codestream_Read_SOT' function.
- An error since the application did not handle a COM object properly.
- An error allowing users to embed executable files.
- U3D out-of-bounds read, write and access errors.
- U3D uninitialized pointer error.
- U3D heap buffer overflow or stack-based buffer overflow error.
- An error when the application is not running in safe-reading-mode and can be abused via '_JP2_Codestream_Read_SOT' function.
- U3D Type Confusion errors.
Vulnerability Impact: Successful exploitation will allow remote attackers to cause a denial of service condition, execute arbitrary code and gain access to sensitive data from memory.
Affected Software/OS: Foxit Reader versions 9.0.1.1049 and prior on windows
Solution: Upgrade to Foxit Reader version 9.1 or later. Please see the references for more information.
CVSS Score: 6.8
CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
|