SB2021050625 - Multiple vulnerabilities in Foxit Reader and PhantomPDF



SB2021050625 - Multiple vulnerabilities in Foxit Reader and PhantomPDF

Published: May 6, 2021 Updated: June 1, 2021

Security Bulletin ID SB2021050625
Severity
High
Patch available
YES
Number of vulnerabilities 14
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 57% Medium 7% Low 36%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 14 secuirty vulnerabilities.


1) Buffer overflow (CVE-ID: N/A)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when exporting certain PDF files to other formats. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


2) Infinite loop (CVE-ID: N/A)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to infinite loop when handling certain XFA forms or link objects. A remote attacker can use a specially crafted PDF file to consume all available system resources and cause denial of service conditions.


3) Input validation error (CVE-ID: N/A)

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to  use of incorrect parameters or objects without proper validation in the implementation of certain functions in JavaScript. A remote attacker can create a specially crafted PDF file, trick the victim into opening it and execute arbitrary code on the system.


4) Link following (CVE-ID: N/A)

The vulnerability allows a local user to delete arbitrary files on the system.

The vulnerability exists due to the way the application handles symbolic links. A local user can create  symbolic links to critical files on the system and delete them, when the system administrator uninstalls the application.


5) Use-after-free (CVE-ID: CVE-2021-21822)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a use-after-free error when handling certain XFA forms or annotation objects. A remote attacker can create a specially crafted PDF file, trick the victim into opening it, trigger a use-after-free error and execute arbitrary code on the system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.


6) Insecure DLL loading (CVE-ID: N/A)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to the application loads DLL libraries in an insecure manner. A remote attacker can place a specially crafted .dll file on a remote SMB fileshare, trick the victim into opening a file, associated with the vulnerable application, and execute arbitrary code on victim's system.


7) Out-of-bounds write (CVE-ID: N/A)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error when handling certain JavaScripts or XFA forms in PDF files. A remote attacker can create a specially crafted PDF file, trick the victim into opening it using the affected software, trigger out-of-bounds write and execute arbitrary code on the target system.


8) Out-of-bounds write (CVE-ID: N/A)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error when parsing certain PDF files that contain nonstandard /Size key value in the Trailer dictionary. A remote attacker can create a specially crafted PDF file, trick the victim into opening it using the affected software, trigger out-of-bounds write and execute arbitrary code on the target system.


9) Out-of-bounds write (CVE-ID: N/A)

The vulnerability allows a remote attacker to preform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error when converting certain PDF files to Microsoft Office files. A remote attacker can create a specially crafted PDF file, trick the victim into opening it using the affected software, trigger out-of-bounds write and crash the application.


10) Files or Directories Accessible to External Parties (CVE-ID: N/A)

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to the application fails to restrict the file type and validate the file path in extractPages and CombineFiles functions. A remote attacker can create a specially crafted PDF file, trick the victim into opening it and overwrite arbitrary files on the system.

Successful exploitation of the vulnerability may allow an attacker to compromise the affected system.


11) SQL injection (CVE-ID: N/A)

The vulnerability allows a remote attacker to execute arbitrary SQL queries in database.

The vulnerability exists due to insufficient sanitization of user-supplied data when processing strings inside PDF files. A remote attacker can create a specially crafted PDF file, trick the victim into opening it and insert or delete databases by inserting codes at the end of the strings.



12) Use of Uninitialized Variable (CVE-ID: N/A)

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to the array access violation resulting from the discrepant information in the form control when users press the Tab key to get focus on a field and input new text in certain XFA forms. A remote attacker can trick the victim into opening a specially crafted PDF file and gain access to sensitive information or crash the application.


13) Heap-based buffer overflow (CVE-ID: N/A)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to the logic error or improper handling of elements when working with certain PDF files that define excessively large value in the file attribute or contain negative leadDigits value in the file attribute. A remote attacker can create specially crafted PDF file, trick the victim into opening it, trigger heap-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


14) Type Confusion (CVE-ID: CVE-2021-31476)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a type confusion error within the handling of XFA templates. A remote attacker can create a specially crafted PDF file, trick the victim into opening it, trigger a type confusion error and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


Remediation

Install update from vendor's website.