PDF-XChange Viewer < 2.5 Build 208 JPEG Processing Buffer Overflow

High Nessus Plugin ID 65549


The remote Windows host has an application that is affected by a buffer overflow vulnerability.


A version of PDF-XChange Viewer prior to 2.5 Build 208 is installed on the remote host. As such, it contains a flaw in the JPEG stream parsing feature that is triggered when the Define Huffman Table header of a JPEG image is not properly validated when embedded in a PDF document. An attacker could exploit this issue by tricking a user into opening a malicious PDF document, resulting in denial of service or arbitrary code execution.


Upgrade to PDF-XChange Viewer 2.5 Build 208 or later.

See Also


Plugin Details

Severity: High

ID: 65549

File Name: pdf-xchange_2_5_208.nasl

Version: $Revision: 1.1 $

Type: local

Agent: windows

Family: Windows

Published: 2013/03/14

Modified: 2013/03/14

Dependencies: 44047

Risk Information

Risk Factor: High


Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:tracker-software:pdf-xchange, cpe:/a:tracker-software:pdf-xchange:viewer

Required KB Items: SMB/Registry/Enumerated, SMB/Tracker_Software/PDF-XChange Viewer/Installed

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2013/01/19

Vulnerability Publication Date: 2013/01/21

Reference Information

CVE: CVE-2013-0729

BID: 57491

OSVDB: 89442