Foxit Reader Firefox Plugin Reloading RCE

This script is Copyright (C) 2009-2016 Tenable Network Security, Inc.


Synopsis :

A PDF viewer installed on the remote host is affected by a remote
code execution vulnerability.

Description :

According to its version, the Foxit Reader installed on the remote
Windows host is affected by an memory corruption issue related to the
Firefox plugin (npFoxitReaderPlugin.dll). An unauthenticated, remote
attacker can exploit this to execute arbitrary code, by tricking a
user into loading a specially crafted web page that repeatedly loads
and unloads the plugin.

See also :

http://seclists.org/fulldisclosure/2009/Oct/198
http://seclists.org/fulldisclosure/2009/Oct/204
https://www.foxitsoftware.com/support/security-bulletins.php
http://seclists.org/fulldisclosure/2009/Nov/211

Solution :

Upgrade to Foxit Reader version 3.1.3.1030, and install the latest
Firefox Plugin via the internal update mechanism.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.3
(CVSS2#E:POC/RL:OF/RC:C)
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 43029 (foxit_reader_firefox_plugin_mem_corrupt.nasl)

Bugtraq ID: 36673

CVE ID:

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now