Foxit Reader < 2.3 Build 2923 util.printf() Floating Point Specifier RCE

high Nessus Plugin ID 32396

Synopsis

A PDF viewer installed on the remote host is affected by a remote code execution vulnerability.

Description

The version of Foxit Reader installed on the remote Windows host is prior to 2.3 Build 2923. It is, therefore, affected by a boundary error that is triggered when parsing format strings containing a floating point specifier in the util.printf() JavaScript function. An attacker can exploit this issue, by tricking a user into opening a crafted PDF file, to execute arbitrary code with the user's privileges.

Solution

Upgrade to Foxit Reader version 2.3 Build 2923 or later.

See Also

https://secuniaresearch.flexerasoftware.com/secunia_research/2008-18/advisory/

https://www.foxitsoftware.com/support/security-bulletins.php

https://www.foxitsoftware.com/company/press.php?id=40

Plugin Details

Severity: High

ID: 32396

File Name: foxit_reader_2_3_2912.nasl

Version: 1.15

Type: local

Agent: windows

Family: Windows

Published: 5/20/2008

Updated: 11/15/2018

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 7.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:foxitsoftware:foxit_reader

Required KB Items: installed_sw/Foxit Reader

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 5/26/2008

Vulnerability Publication Date: 5/20/2008

Exploitable With

CANVAS (CANVAS)

Core Impact

Reference Information

CVE: CVE-2008-1104

BID: 29288

CWE: 119

CERT: 119747

Secunia: 29941