Jump to content
Sign in to follow this  
TCH-Thomas

Foxit Reader "util.printf()" Buffer Overflow

Recommended Posts

From:

Secunia (secunia.com/advisories/29941)

 

Rating:

Highly critical

 

Description:

Secunia Research has discovered a vulnerability in Foxit Reader, which can be exploited by malicious people to compromise a user's system.

 

The vulnerability is caused due to a boundary error when parsing format strings containing a floating point specifier in the "util.printf()" JavaScript function. This can be exploited to cause a stack-based buffer overflow via a specially crafted PDF file.

 

Successful exploitation allows execution of arbitrary code.

 

The vulnerability is confirmed in version 2.3 build 2825. Other versions may also be affected.

 

Solution:

The vulnerability is fixed in upcoming version 2.3 build 2912.

Download at: foxitsoftware.com or use the update option in the help menu.

Share this post


Link to post
Share on other sites

The updated version taking care of this problem has now been released (build number seems to have been changed though). :starwars:

Share this post


Link to post
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Sign in to follow this  

×
×
  • Create New...