This article is more than 1 year old

400 million Foxit users need to catch up with patched-up reader

Toxic Foxit plugs bugs

Makers of popular PDF reader Foxit have patched 12 dangerous vulnerabilities that could have resulted in remote code execution.

Some 400 million users run the flagship reader billed as an alternative to Adobe Reader. Thedozen flaws are patched in Windows and Linux variants.

Users would need to be conned into opening a malicious PDF with Foxit Reader or PhantomPDF in order to be compromised using the vulnerabilities.

Seven of the patched holes allowed direct remote code execution while the remainder required chaining with other flaws to achieve the level of compromise.

Foxit listed six of the flaws in an advisory.

Version 8 of Reader and PhantomPDF plug the flaws:

  • ConvertToPDF TIFF Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
  • ConvertToPDF BMP Parsing Out-Of-Bounds Read Information Disclosure Vulnerability
  • ConvertToPDF GIF Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
  • JPEG Parsing Out-Of-Bounds Read Information Disclosure Vulnerability
  • JPEG Parsing Out-Of-Bounds Read Information Disclosure Vulnerability
  • ConvertToPDF TIFF Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
  • exportData Restrictions Bypass Remote Code Execution Vulnerability
  • Safe Mode Bypass Information Disclosure Vulnerability
  • FlateDecode Use-After-Free Remote Code Execution Vulnerability
  • Pattern Uninitialized Pointer Remote Code Execution Vulnerability
  • FlateDecode Use-After-Free Remote Code Execution Vulnerability
  • GoToR action Stack Buffer Overflow Remote Code Execution Vulnerability

®

More about

TIP US OFF

Send us news


Other stories you might like