Foxit Reader < Multiple Vulnerabilities

High Nessus Plugin ID 55671


A PDF viewer installed on the remote host is affected by multiple vulnerabilities.


The version of Foxit Reader installed on the remote Windows host is prior to It is, therefore, affected by multiple vulnerabilities :

- A flaw exists in how dynamic-link library (DLL) files are located and loaded, specifically files dwmapi.dll, dwrite.dll, and msdrm.dll. The application uses a fixed path to search for these files, and the path can include directories that may not be trusted or under the user's control. An attacker can exploit this issue, via a crafted Trojan horse DLL file injected into the search path, to execute arbitrary code with the privileges of the application or the user executing the application.
- A boundary error exists in the FoxitReaderOCX ActiveX control in the OpenFile() method due to improper sanitization of user-supplied input. An attacker can exploit this, via an overly long string passed to the 'strFilePath' parameter, to execute arbitrary code.
(VulnDB 74315)


Upgrade to Foxit Reader version or later.

See Also

Plugin Details

Severity: High

ID: 55671

File Name: foxit_reader_5_0_2_0718.nasl

Version: $Revision: 1.10 $

Type: local

Agent: windows

Family: Windows

Published: 2011/07/25

Modified: 2016/10/10

Dependencies: 32395

Risk Information

Risk Factor: High


Base Score: 9.3

Temporal Score: 7.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:POC/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:foxitsoftware:foxit_reader

Required KB Items: installed_sw/Foxit Reader

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2011/07/21

Vulnerability Publication Date: 2011/07/21

Reference Information

CVE: CVE-2011-3691

BID: 48836

OSVDB: 74315, 74316

EDB-ID: 11196