Foxit Reader < 4.1.1.0805 FreeType CFF Opcodes RCE

high Nessus Plugin ID 48276

Language:

Synopsis

A PDF viewer installed on the remote host is affected by a remote code execution vulnerability.

Description

The version of Foxit Reader installed on the remote Windows host is prior to 4.1.1.0805. It is, therefore, affected by a remote code execution vulnerability in the FreeType engine due to multiple stack-based buffer overflow conditions in the CFF Type2 CharStrings interpreter, specifically within the function cff_decoder_parse_charstrings(). An attacker can exploit this, via crafted CFF opcodes in embedded fonts in a PDF document, to cause a denial of service or to execute arbitrary code with the user's privileges.

Solution

Upgrade to Foxit Reader version 4.1.1.0805 or later.

See Also

https://www.f-secure.com/weblog/archives/00002002.html

https://www.foxitsoftware.com/support/security-bulletins.php

https://www.foxitsoftware.com/company/press.php?id=194

Plugin Details

Severity: High

ID: 48276

File Name: foxit_reader_4_1_1_0805.nasl

Version: 1.18

Type: local

Agent: windows

Family: Windows

Published: 8/9/2010

Updated: 11/15/2018

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.2

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:foxitsoftware:foxit_reader

Required KB Items: installed_sw/Foxit Reader

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 8/6/2010

Vulnerability Publication Date: 8/6/2010

Exploitable With

CANVAS (White_Phosphorus)

Core Impact

Reference Information

CVE: CVE-2010-1797

BID: 42241

CERT: 275247

Secunia: 40903