SB2017070408 - Multiple vulnerabilities in Foxit Reader and PhantomPDF
Published: July 4, 2017
Security Bulletin ID
SB2017070408
Severity
High
Patch available
YES
Number of vulnerabilities
6
Exploitation vector
Remote access
Highest impact
Code execution
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 6 secuirty vulnerabilities.
1) NULL pointer dereference (CVE-ID: N/A)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.The vulnerability exists due to NULL pointer dereference error when processing PDF files. A remote attacker cat create a specially crafted PDF file, trick the victim into opening it and crash the application.
2) Security restrictions bypass (CVE-ID: N/A)
The vulnerability allows a remote attacker to bypass intended security restrictions.The vulnerability exists due to unspecified error, which can lead to execution of JavaScript code within PDF file, even when JavaScript Actions in Trust Manager are disabled. A remote attacker can create a specially crafted PDF file, trick the victim into opening it and compromise vulnerable system.
Successful exploitation of the vulnerability may allow an attacker to execute arbitrary code on the target system with privileges of the current user.
3) Use-after-free (CVE-ID: N/A)
The vulnerability allows a remote attacker to compromise vulnerable system.The vulnerability exists due to use-after-free error when processing PDF files. A remote attacker can create a specially crafted PDF file, trick the victim into opening it and compromise vulnerable system.
Successful exploitation of the vulnerability may allow an attacker to execute arbitrary code on the target system with privileges of the current user.
4) Out-of-bound read (CVE-ID: N/A)
The vulnerability allows a remote attacker to bypass intended security restrictions.The vulnerability exists due to boundary error, when processing PDF files. A remote attacker can create a specially crafted PDF file, trick the victim into opening it, trigger out-of-bounds read and gain access to potentially sensitive information.
Successful exploitation of the vulnerability may allow an attacker to gain access to potentially sensitive information.
5) Out-of-bounds write (CVE-ID: CVE-2017-10994)
The vulnerability allows a remote attacker to compromise vulnerable system.The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF file, trick the victim into opening, trigger out-of-bounds write and compromise vulnerable system.
Successful exploitation of the vulnerability may allow an attacker to execute arbitrary code on the target system with privileges of the current user.
6) Improper initialization (CVE-ID: N/A)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.The vulnerability exists due to improper initialization of variables before their usage when processing PDF files. A remote attacker cat create a specially crafted PDF file, trick the victim into opening it and crash the application.
Remediation
Install update from vendor's website.