Executive Summary
Summary | |
---|---|
Title | Foxit Reader buffer overflow vulnerability |
Informations | |||
---|---|---|---|
Name | VU#119747 | First vendor Publication | 2008-05-27 |
Vendor | VU-CERT | Last vendor Modification | 2008-05-27 |
Severity (Vendor) | N/A | Revision | M |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Vulnerability Note VU#119747Foxit Reader buffer overflow vulnerabilityOverviewFoxit Reader contains a buffer overflow vulnerability that may allow an attacker to execute arbitrary code.I. DescriptionFoxit Reader is a PDF reader that is available on multiple operating systems.From the Secuia Research advisoryFoxit Reader "util.printf()" Buffer Overflow:
The vulnerability is caused due to a boundary error when parsing format strings containing a floating point specifier in the "util.printf()" JavaScript function. This can be exploited to cause a stack-based buffer overflow via a specially crafted PDF file. II. ImpactA remote, unauthenticated attacker may be able to execute arbitrary code.III. SolutionFoxit Reader version 2.3 build 2912 was released to address this issue.Do not open untrusted PDF files
References
This vulnerability was published by Dyon Balding from Secunia Research. This document was written by Ryan Giobbi.
|
Original Source
Url : http://www.kb.cert.org/vuls/id/119747 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 4 |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
45351 | Foxit Reader util.printf() Function PDF File Handling Overflow |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2008-05-20 | Name : A PDF viewer installed on the remote host is affected by a remote code execut... File : foxit_reader_2_3_2912.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2016-03-08 13:26:07 |
|