Foxit 3D Plugin Beta 9.x < 9.7.4.29600 / 10.x < 10.1.0.37494 RCE

high Nessus Plugin ID 144448

Synopsis

The remote Windows host has a Foxit plugin installed that is affected by a remote code execution vulnerability.

Description

The version of the Foxit 3D plugin installed on the remote Windows host is 9.x prior to 9.7.4.29600, or 10.x prior to 10.1.0.37494. It is, therefore affected by an Out-of-Bounds Read/Write or Stack-based Buffer Overflow vulnerability due to improper validation of data when parsing certain U3D objects that contain an incorrect data stream. An unauthenticated, local attacker can exploit this to disclose information or execute remote code.

Solution

Upgrade to Foxit 3D Plugin Beta 9.7.4.29600, 10.1.0.37494, or later

See Also

http://www.nessus.org/u?2f244c3e

Plugin Details

Severity: High

ID: 144448

File Name: foxit_3d_plugin_beta_10_1_0_37494.nasl

Version: 1.3

Type: local

Agent: windows

Family: Windows

Published: 12/18/2020

Updated: 2/1/2024

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2020-17413

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 6.8

Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: x-cpe:/a:foxitsoftware:u3dbrowser_plugin

Required KB Items: installed_sw/Foxit U3DBrowser Plugin

Exploit Ease: No known exploits are available

Patch Publication Date: 9/28/2020

Vulnerability Publication Date: 9/28/2020

Reference Information

CVE: CVE-2020-17411, CVE-2020-17412, CVE-2020-17413