Facebook Google Plus Twitter LinkedIn YouTube RSS Menú Buscar Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Foxit Reader < 8.2.1 Multiple Vulnerabilities

High

Synopsis

The remote host has been observed running a version of Foxit Reader that is subject to multiple attack vectors.

Description

Versions of Foxit Reader prior to 8.2.1 are affected by the following vulnerabilities :

- Multiple use-after-free errors exist that are triggered as user-supplied input is not properly validated. With a specially crafted file, a context-dependent attacker can dereference already freed memory and potentially execute arbitrary code. (OSVDB 152949) - Multiple type confusion errors exist that are triggered as user-supplied input is not properly validated. With a specially crafted file, a context-dependent attacker can potentially execute arbitrary code. (OSVDB 152950) - Multiple unspecified out-of-bounds access flaws exist. These flaws may allow a context-dependent attacker to disclose memory contents or potentially execute arbitrary code. (OSVDB 152951) - A flaw exists that is triggered as certain input is not properly validated. This may allow a context-dependent attacker to corrupt memory and potentially execute arbitrary code. (OSVDB 152952) - A a NULL pointer dereference error exists that is triggered when handling a specially crafted PDF file. This may allow a context-dependent attacker to cause the program to crash. (OSVDB 153018) - An out-of-bounds read flaw exists that is triggered when handling specially crafted fonts in PDF files. This may allow a context-dependent attacker to potentially disclose sensitive information. (OSVDB 153399) - An out-of-bounds read flaw exists that is triggered when handling specially crafted PDF files. This may allow a context-dependent attacker to potentially disclose sensitive information. (OSVDB 153400, OSVDB 153404) - An out-of-bounds access flaw exists that is triggered when handling specially crafted Pattern objects. This may allow a context-dependent attacker to potentially execute arbitrary code. (OSVDB 153401) - An out-of-bounds access flaw exists that is triggered when handling specially crafted XFA forms. This may allow a context-dependent attacker to potentially execute arbitrary code. (OSVDB 153402) - An out-of-bounds access flaw exists that is triggered when handling specially crafted ePub files. This may allow a context-dependent attacker to potentially execute arbitrary code. (OSVDB 153403) - An out-of-bounds read flaw exists that is triggered when handling specially crafted JPEG2000 files. This may allow a context-dependent attacker to potentially disclose sensitive information. (OSVDB 153405) - An out-of-bounds read flaw exists that is triggered when handling specially crafted PDF files. This may allow a context-dependent attacker to potentially disclose sensitive information. (OSVDB 153406) - A use-after-free error exists. The issue is triggered by a failure to validate the existence of an object before performing operations on it. This may allow a context-dependent attacker to use a specially crafted Xref object to dereference already freed memory and potentially execute arbitrary code. (OSVDB 153431) - A use-after-free error exists in the 'execMenuItem()' function. The issue is triggered by a failure to validate the existence of an object before performing operations on it. This may allow a context-dependent attacker to dereference already freed memory and potentially execute arbitrary code. (OSVDB 153432, OSVDB 153433, OSVDB 153434) - A use-after-free error exists in the 'deleteItemAt()' method. The issue is triggered by a failure to validate the existence of an object before performing operations on it. This may allow a context-dependent attacker to dereference already freed memory and potentially execute arbitrary code. (OSVDB 153435) - A use-after-free error exists in the 'openDoc()' method. The issue is triggered by a failure to validate the existence of an object before performing operations on it. This may allow a context-dependent attacker to dereference already freed memory and potentially execute arbitrary code. (OSVDB 153436) - A use-after-free error exists. The issue is triggered by a failure to validate the existence of an object before performing operations on it. This may allow a context-dependent attacker to use a specially crafted ePub file to dereference already freed memory and potentially execute arbitrary code. (OSVDB 153437) - A use-after-free error exists in the 'buttonGetIcon()' method. The issue is triggered by a failure to validate the existence of an object before performing operations on it. This may allow a context-dependent attacker to dereference already freed memory and potentially execute arbitrary code. (OSVDB 153438)

Soluciones

Upgrade Foxit Reader to version 8.2.1 or later.