Foxit PhantomPDF < 7.2 Multiple Vulnerabilities

high Nessus Plugin ID 86697

Synopsis

A PDF toolkit installed on the remote Windows host is affected by multiple vulnerabilities.

Description

According to its version, the Foxit PhantomPDF application (formally known as Phantom) installed on the remote Windows host is affected by multiple vulnerabilities :

- A memory overflow condition exists in the PDF creator plugin (ConvertToPDF_x86.dll) when converting a PNG file to a PDF file due to an error that occurs when copying a memory block. An attacker can exploit this to execute arbitrary code. (BID 76130)

- A memory corruption issue exists when opening certain XFA forms. An attacker can exploit this to generate files that crash the application. (BID 76132)

- A heap corruption issue exists when processing malformed color table data in a GIF file. An unauthenticated, remote attacker can exploit this by using a crafted GIF file to execute arbitrary code.

- A flaw exists when converting a TIFF file to a PDF file due to reading a VTABLE from an invalid location. An unauthenticated, remote attacker can exploit this by using a crafted TIFF image to execute arbitrary code.

Solution

Upgrade to Foxit PhantomPDF version 7.2.0722 or later.

See Also

https://www.foxitsoftware.com/support/security-bulletins.php

Plugin Details

Severity: High

ID: 86697

File Name: foxit_phantom_7_2_0_0722.nasl

Version: 1.8

Type: local

Agent: windows

Family: Windows

Published: 11/2/2015

Updated: 1/2/2019

Supported Sensors: Nessus Agent, Nessus

Risk Information

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:foxitsoftware:phantom, cpe:/a:foxitsoftware:phantompdf

Required KB Items: installed_sw/FoxitPhantomPDF

Patch Publication Date: 7/29/2015

Vulnerability Publication Date: 8/6/2015

Reference Information

BID: 76130, 76132, 76391