CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
EPSS
Percentile
96.0%
Foxit Reader contains a buffer overflow vulnerability that may allow an attacker to execute arbitrary code.
Foxit Reader is a PDF reader that is available on multiple operating systems.
From the Secuia Research advisory Foxit Reader "util.printf()" Buffer Overflow:
S__ecunia Research has discovered a vulnerability in Foxit Reader, which can be exploited by malicious people to compromise a userβs system.
_
The vulnerability is caused due to a boundary error when parsing format strings containing a floating point specifier in the βutil.printf()β JavaScript function. This can be exploited to cause a stack-based buffer overflow via a specially crafted PDF file.
_
To exploit this vulnerability an attacker would have to persuade a user to open a specially crafted PDF file. The malicious PDF could be hosted on a web page or sent via email.
A remote, unauthenticated attacker may be able to execute arbitrary code.
Foxit Reader version 2.3 build 2912 was released to address this issue.
Do not open untrusted PDF files
Do not open unfamiliar or unexpected PDF attachments. Users can convert PDF documents to text or HTML by using search engine features or other hosted PDF rendering services.
119747
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Updated: May 27, 2008
Affected
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
This vulnerability was published by Dyon Balding from Secunia Research.
This document was written by Ryan Giobbi.
CVE IDs: | CVE-2008-1104 |
---|---|
Severity Metric: | 1.69 Date Public: |