Foxit Reader Firefox Plugin URL File Name RCE

This script is Copyright (C) 2013-2016 Tenable Network Security, Inc.


Synopsis :

A PDF viewer installed on the remote host is affected by a remote
code execution vulnerability.

Description :

According to its version, the Foxit Reader installed on the remote
Windows host is affected by an boundary error related to the Firefox
plugin (npFoxitReaderPlugin.dll) due to improper processing of
user-supplied input when handing an overly long file name in a URL
query string. An unauthenticated, remote attacker can exploit this,
via a crafted URL, to trigger a stack-based buffer overflow, resulting
in a denial of service or the execution of arbitrary code.

See also :

http://www.nessus.org/u?7497e804
https://www.foxitsoftware.com/support/security-bulletins.php

Solution :

Upgrade to Foxit Reader version 5.4.5.0114, and install the latest
Firefox Plugin via the internal update mechanism.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.7
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 64094 ()

Bugtraq ID: 57174

CVE ID:

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now