Foxit Reader < Memory Corruption RCE

High Nessus Plugin ID 57050


A PDF viewer installed on the remote host is affected by a remote code execution vulnerability.


The version of Foxit Reader installed on the remote Windows host is prior to It is, therefore, affected by a memory corruption issue due to a cross-border assignment of an array when opening a specially crafted PDF file. An attacker can exploit this, by tricking a user into opening a crafted PDF file, to execute arbitrary code with the user's privileges.


Upgrade to Foxit Reader version or later.

See Also

Plugin Details

Severity: High

ID: 57050

File Name: foxit_reader_5_1_3_1201.nasl

Version: $Revision: 1.6 $

Type: local

Agent: windows

Family: Windows

Published: 2011/12/08

Modified: 2016/03/07

Dependencies: 32395

Risk Information

Risk Factor: High


Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:foxitsoftware:foxit_reader

Required KB Items: installed_sw/Foxit Reader

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2011/12/07

Vulnerability Publication Date: 2011/12/07

Reference Information

BID: 50947

OSVDB: 77566