Vulnerability Note VU#119747

Foxit Reader buffer overflow vulnerability

Original Release date: 27 May 2008 | Last revised: 27 May 2008

Overview

Foxit Reader contains a buffer overflow vulnerability that may allow an attacker to execute arbitrary code.

Description

Foxit Reader is a PDF reader that is available on multiple operating systems.

From the Secuia Research advisory Foxit Reader "util.printf()" Buffer Overflow:

    Secunia Research has discovered a vulnerability in Foxit Reader, which can be exploited by malicious people to compromise a user's system.

    The vulnerability is caused due to a boundary error when parsing format strings containing a floating point specifier in the "util.printf()" JavaScript function. This can be exploited to cause a stack-based buffer overflow via a specially crafted PDF file.
To exploit this vulnerability an attacker would have to persuade a user to open a specially crafted PDF file. The malicious PDF could be hosted on a web page or sent via email.

Impact

A remote, unauthenticated attacker may be able to execute arbitrary code.

Solution

Foxit Reader version 2.3 build 2912 was released to address this issue.

Do not open untrusted PDF files

Do not open unfamiliar or unexpected PDF attachments. Users can convert PDF documents to text or HTML by using search engine features or other hosted PDF rendering services.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
Foxit Software CompanyAffected-27 May 2008
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A

References

Credit

This vulnerability was published by Dyon Balding from Secunia Research.

This document was written by Ryan Giobbi.

Other Information

  • CVE IDs: CVE-2008-1104
  • Date Public: 20 May 2008
  • Date First Published: 27 May 2008
  • Date Last Updated: 27 May 2008
  • Severity Metric: 1.69
  • Document Revision: 21

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.