Foxit Reader < 9.5.0 Multiple Vulnerabilities

high Nessus Plugin ID 125153

Synopsis

A PDF toolkit installed on the remote Windows host is affected by multiple vulnerabilities.

Description

According to its version, the Foxit Reader application (formally known as Phantom) installed on the remote Windows host is prior to 8.3.10. It is, therefore, affected by multiple vulnerabilities:

- A heap-based buffer overflow condition exists in the proxyCPDFAction, proxyCheckLicence, proxyDoAction, proxyGetAppEdition, or proxyPreviewAction due to a stack buffer overflow or out-of-bounds read. An authenticated, local attacker can exploit this, via large integer or long string causing a denial of service condition or the execution of arbitrary code.

- A directory traversal vulnerability exists in the cPDF plugin due to unexpected javascript invocation resulting in remote code execution. An unauthenticated, remote attacker can exploit this, by invoking javascript through the console to write local files. (ZDI-CAN-7407)

- A integer overflow and crash condition exists in the XFA stuff method due to the lack of proper validation of user-supplied data. An attacker can explit this to disclose information. (ZDI-CAN-7561)

- A use-after-free, out-of-bounds read, and crash vulnerability exists when converting HTML files to PDFs. An authenticated, remote attacker can exploit this to disclose information or to execute arbitrary code. (ZDI-CAN-7620/ZDI-CAN-7844/ZDI-CAN-8170)

- A out-of-bounds write and crash vulnerability exists. An authenticated, remote attacker can exploit this to execute arbitrary code. (ZDI-CAN-7613/ZDI-CAN-7614/ZDI-CAN-7701/ ZDI-CAN-7972)

- A use-after-free or out-of-bounds write and crash vulnerability exists. An authenticated, local attacker can exploit this to execute arbitrary code. (ZDI-CAN-7696/ZDI-CAN-7694)

- A use-after-free vulnerability. An authenticated, remote attacker can exploit this to execute arbitrary code. (ZDI-CAN-7696/ZDI-CAN-7694/ZDI-CAN-7777/ZDI-CAN-7874)

- A use-after-free, remote code execution, information disclosure vulnerability exists when deleting Field with nested scripts. An authenticated, local attacker can exploit this to execute arbitrary code. (ZDI-CAN-8162/ZDI-CAN-8163/ZDI-CAN-8164/ ZDI-CAN-8165/ZDI-CAN-8229/ZDI-CAN-8230/ZDI-CAN-8231/ZDI-CAN-8272)

Solution

Upgrade to Foxit Reader version 9.5.0 or later.

See Also

https://www.foxitsoftware.com/support/security-bulletins.php

https://www.zerodayinitiative.com/advisories/ZDI-19-428/

https://www.zerodayinitiative.com/advisories/ZDI-19-429/

https://www.zerodayinitiative.com/advisories/ZDI-19-430/

https://www.zerodayinitiative.com/advisories/ZDI-19-431/

https://www.zerodayinitiative.com/advisories/ZDI-19-432/

https://www.zerodayinitiative.com/advisories/ZDI-19-433/

https://www.zerodayinitiative.com/advisories/ZDI-19-434/

https://www.zerodayinitiative.com/advisories/ZDI-19-435/

https://www.zerodayinitiative.com/advisories/ZDI-19-436/

https://www.zerodayinitiative.com/advisories/ZDI-19-437/

https://www.zerodayinitiative.com/advisories/ZDI-19-438/

https://www.zerodayinitiative.com/advisories/ZDI-19-439/

https://www.zerodayinitiative.com/advisories/ZDI-19-440/

https://www.zerodayinitiative.com/advisories/ZDI-19-441/

https://www.zerodayinitiative.com/advisories/ZDI-19-442/

https://www.zerodayinitiative.com/advisories/ZDI-19-443/

https://www.zerodayinitiative.com/advisories/ZDI-19-444/

https://www.zerodayinitiative.com/advisories/ZDI-19-445/

https://www.zerodayinitiative.com/advisories/ZDI-19-446/

https://www.zerodayinitiative.com/advisories/ZDI-19-447/

https://www.zerodayinitiative.com/advisories/ZDI-CAN-7407/

https://www.zerodayinitiative.com/advisories/ZDI-CAN-7561/

https://www.zerodayinitiative.com/advisories/ZDI-CAN-7613/

https://www.zerodayinitiative.com/advisories/ZDI-CAN-7614/

https://www.zerodayinitiative.com/advisories/ZDI-CAN-7620/

https://www.zerodayinitiative.com/advisories/ZDI-CAN-7694/

https://www.zerodayinitiative.com/advisories/ZDI-CAN-7696/

https://www.zerodayinitiative.com/advisories/ZDI-CAN-7701/

https://www.zerodayinitiative.com/advisories/ZDI-CAN-7769/

https://www.zerodayinitiative.com/advisories/ZDI-CAN-7777/

https://www.zerodayinitiative.com/advisories/ZDI-CAN-7844/

https://www.zerodayinitiative.com/advisories/ZDI-CAN-7874/

https://www.zerodayinitiative.com/advisories/ZDI-CAN-7972/

https://www.zerodayinitiative.com/advisories/ZDI-CAN-8162/

https://www.zerodayinitiative.com/advisories/ZDI-CAN-8163/

https://www.zerodayinitiative.com/advisories/ZDI-CAN-8164/

https://www.zerodayinitiative.com/advisories/ZDI-CAN-8165/

https://www.zerodayinitiative.com/advisories/ZDI-CAN-8170/

https://www.zerodayinitiative.com/advisories/ZDI-CAN-8229/

https://www.zerodayinitiative.com/advisories/ZDI-CAN-8230/

https://www.zerodayinitiative.com/advisories/ZDI-CAN-8231/

https://www.zerodayinitiative.com/advisories/ZDI-CAN-8272/

Plugin Details

Severity: High

ID: 125153

File Name: foxit_reader_9_5_0.nasl

Version: 1.5

Type: local

Agent: windows

Family: Windows

Published: 5/15/2019

Updated: 5/20/2022

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2019-6769

CVSS v3

Risk Factor: High

Base Score: 8.1

Temporal Score: 7.1

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

CVSS Score Source: CVE-2018-20316

Vulnerability Information

CPE: cpe:/a:foxitsoftware:foxit_reader

Required KB Items: installed_sw/Foxit Reader

Exploit Ease: No known exploits are available

Patch Publication Date: 4/18/2019

Vulnerability Publication Date: 4/18/2019

Reference Information

CVE: CVE-2018-20309, CVE-2018-20310, CVE-2018-20311, CVE-2018-20312, CVE-2018-20313, CVE-2018-20314, CVE-2018-20315, CVE-2018-20316, CVE-2019-6754, CVE-2019-6755, CVE-2019-6756, CVE-2019-6757, CVE-2019-6758, CVE-2019-6759, CVE-2019-6760, CVE-2019-6761, CVE-2019-6762, CVE-2019-6763, CVE-2019-6764, CVE-2019-6765, CVE-2019-6766, CVE-2019-6767, CVE-2019-6768, CVE-2019-6769, CVE-2019-6770, CVE-2019-6771, CVE-2019-6772, CVE-2019-6773