SB2016101912 - Multiple vulnerabilities in Foxit Reader and PhantomPDF 



SB2016101912 - Multiple vulnerabilities in Foxit Reader and PhantomPDF

Published: October 19, 2016

Security Bulletin ID SB2016101912
Severity
High
Patch available
YES
Number of vulnerabilities 6
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 83% Low 17%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 6 secuirty vulnerabilities.


1) Arbitrary code execution (CVE-ID: N/A)

The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.
The weakness is due to out-of bounds read or out-of-bounds write that lets attackers to access potentially sensitive onformation and execute arbitrary code.
Successful exploitation of the vulnerability results in information disclosure and arbitrary code execution on the vulnerable system.

2) Arbitrary code execution (CVE-ID: N/A)

The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.
The weakness is due to use-after-free and lets attackers to execute arbitrary code.
Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.

3) Arbitrary code execution (CVE-ID: N/A)

The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.
The weakness is due to heap corruption and lets attackers to execute arbitrary code.
Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.

4) Denial of service (CVE-ID: N/A)

The vulnerability allows a remote unauthenticated user to cause DoS conditions on the target system.
The weakness is caused by null pointer dereference that lets attackers to trigger application crash.
Successful exploitation of the vulnerability results in denial of service on the vulnerable system.

5) Privilege escalation (CVE-ID: N/A)

The vulnerability allows a local user to obtain elevated privileges on the target system.
The vulnerability exists due to weak file permissions that lets attacker to elevate his privileges and access the system.
Successful exploitation of this vulnerability may result in arbitrary code execution on the vulnerable system.

6) Information disclosure (CVE-ID: CVE-2016-8334)

The vulnerability allows a local user to obtain potentially sensitive information on the target system.
The weakness is caused by insufficient bounds validation during analysis of JBIG2 segments in PDF file. By convincing a victim to open a specially crafted file, attackers can cause out-of-bounds heap memory condition that lets view important data.
Successful exploitation of the vulnerability results in disclosure of potentially sensitive information.

Remediation

Install update from vendor's website.