SB2024121815 - Multiple vulnerabilities in Foxit PDF Reader and Editor for Windows
Published: December 18, 2024 Updated: December 20, 2024
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 7 secuirty vulnerabilities.
1) Improper authorization in handler for custom URL scheme (CVE-ID: N/A)
The vulnerability allows a remote attacker to compromise the affected system.
The vulnerability exists due to an error when handling XFA documents. A remote attacker can trick the victim into opening a specially crafted PDF document and compromise the affected system.
2) Improper verification of cryptographic signature (CVE-ID: N/A)
The vulnerability allows a remote attacker to perform spoofing attack.
The vulnerability exists due to the application improperly ignores the changes to the “/NeedsRendering”
key or “TextField” field when verifying the XFA documents. A remote attacker perform spoofing attack and make users believe that the document is properly signed.
3) Information disclosure (CVE-ID: N/A)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to the application fails to provide a reasonable prompt for user
confirmation when executing the “app.openDoc”/“LaunchAction” functions,
or ignores the encryption elements and transmits form content in clear
text without a proper prompt for users. A remote attacker can trick the victim into opening a specially crafted XFA file and gain access to sensitive information.
4) Insecure DLL loading (CVE-ID: N/A)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to the application loads the edputil.dll library in an insecure manner. A remote attacker can place a specially crafted edputil.dll file on a remote SMB fileshare, trick the victim into opening a file, associated with the vulnerable application, and execute arbitrary code on victim's system.
5) Use-after-free (CVE-ID: CVE-2024-49576)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error when handling PDF files. A remote attacker can trick the victim into opening a specially crafted PDF file, trigger a use-after-free error and execute arbitrary code on the system.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
6) Use-after-free (CVE-ID: CVE-2024-47810)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error when handling PDF files. A remote attacker can trick the victim into opening a specially crafted PDF file, trigger a use-after-free error and execute arbitrary code on the system.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
7) Untrusted search path (CVE-ID: N/A)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to usage of an untrusted search path during application update. A local user can place a malicious binary into a specific location on the system and execute arbitrary code with escalated privileges.
Remediation
Install update from vendor's website.
References
- https://www.foxitsoftware.com/support/security-bulletins.html?Security+updates+available+in+Foxit+PDF+Reader+2024.4+and+Foxit+PDF+Editor+2024.4%2F13.1.52024-12-17+00%3A00%3A00
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-2093
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-2094