search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Foxit Reader buffer overflow vulnerability

Vulnerability Note VU#119747

Original Release Date: 2008-05-27 | Last Revised: 2008-05-27


Foxit Reader contains a buffer overflow vulnerability that may allow an attacker to execute arbitrary code.


Foxit Reader is a PDF reader that is available on multiple operating systems.

From the Secuia Research advisory Foxit Reader "util.printf()" Buffer Overflow:
Secunia Research has discovered a vulnerability in Foxit Reader, which can be exploited by malicious people to compromise a user's system.

The vulnerability is caused due to a boundary error when parsing format strings containing a floating point specifier in the "util.printf()" JavaScript function. This can be exploited to cause a stack-based buffer overflow via a specially crafted PDF file.

To exploit this vulnerability an attacker would have to persuade a user to open a specially crafted PDF file. The malicious PDF could be hosted on a web page or sent via email.


A remote, unauthenticated attacker may be able to execute arbitrary code.


Foxit Reader version 2.3 build 2912 was released to address this issue.

Do not open untrusted PDF files

Do not open unfamiliar or unexpected PDF attachments. Users can convert PDF documents to text or HTML by using search engine features or other hosted PDF rendering services.

Vendor Information


Foxit Software Company Affected

Updated:  May 27, 2008



Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

CVSS Metrics

Group Score Vector



This vulnerability was published by Dyon Balding from Secunia Research.

This document was written by Ryan Giobbi.

Other Information

CVE IDs: CVE-2008-1104
Severity Metric: 1.69
Date Public: 2008-05-20
Date First Published: 2008-05-27
Date Last Updated: 2008-05-27 19:55 UTC
Document Revision: 22

Sponsored by CISA.