Lucene search

K
nessusThis script is Copyright (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof.FOXIT_READER_4_3_1_0218.NASL
HistoryFeb 25, 2011 - 12:00 a.m.

Foxit Reader < 4.3.1.0218 Multiple Vulnerabilities

2011-02-2500:00:00
This script is Copyright (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
15

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

EPSS

0.058

Percentile

93.4%

The version of Foxit Reader installed on the remote Windows host is prior to 4.3.1.0218. It is, therefore, affected by multiple vulnerabilities :

  • An integer overflow condition exists when parsing certain ICC chunks. An attacker can exploit this, via crafted ICC chunks in a PDF file, to cause a heap-based buffer overflow, resulting in the execution of arbitrary code. (CVE-2011-0332)

  • A flaw exists in the JavaScript API related to the createDataObject() function. An attacker can exploit this, via a crafted PDF file using a call to that function, to create or overwrite arbitrary files.

#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(52458);
  script_version("1.14");
  script_cvs_date("Date: 2019/01/02 11:18:37");

  script_cve_id("CVE-2011-0332");
  script_bugtraq_id(46565, 46763);
  script_xref(name:"EDB-ID", value:"16978");
  script_xref(name:"Secunia", value:"43329");
  script_xref(name:"Secunia", value:"43776");

  script_name(english:"Foxit Reader < 4.3.1.0218 Multiple Vulnerabilities");
  script_summary(english:"Checks the version of Foxit Reader.");

  script_set_attribute(attribute:"synopsis", value:
"A PDF viewer installed on the remote host is affected by multiple
vulnerabilities.");
  script_set_attribute(attribute:"description", value:
"The version of Foxit Reader installed on the remote Windows host is
prior to 4.3.1.0218. It is, therefore, affected by multiple
vulnerabilities :

  - An integer overflow condition exists when parsing
    certain ICC chunks. An attacker can exploit this, via
    crafted ICC chunks in a PDF file, to cause a heap-based
    buffer overflow, resulting in the execution of arbitrary
    code. (CVE-2011-0332)

  - A flaw exists in the JavaScript API related to the
    createDataObject() function. An attacker can exploit
    this, via a crafted PDF file using a call to that
    function, to create or overwrite arbitrary files.
");
  # https://scarybeastsecurity.blogspot.com/2011/03/dangerous-file-write-bug-in-foxit-pdf.html
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?8294358a");
  script_set_attribute(attribute:"see_also", value:"https://www.foxitsoftware.com/support/security-bulletins.php");
  script_set_attribute(attribute:"see_also", value:"https://www.foxitsoftware.com/company/press.php?id=210");
  script_set_attribute(attribute:"solution", value:
"Upgrade to Foxit Reader version 4.3.1.0218 or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");
  script_set_attribute(attribute:"metasploit_name", value:'Foxit PDF Reader 4.2 Javascript File Write');
  script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");
  
  script_set_attribute(attribute:"vuln_publication_date", value:"2011/02/25");
  script_set_attribute(attribute:"patch_publication_date", value:"2011/02/24");
  script_set_attribute(attribute:"plugin_publication_date", value:"2011/02/25");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe",value:"cpe:/a:foxitsoftware:foxit_reader");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Windows");

  script_copyright(english:"This script is Copyright (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("foxit_reader_installed.nasl");
  script_require_keys("installed_sw/Foxit Reader");

  exit(0);
}

include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("install_func.inc");

app = "Foxit Reader";
install = get_single_install(app_name:app, exit_if_unknown_ver:TRUE);
version = install["version"];
path    = install["path"];

report = NULL;

fixed_version = "4.3.1.0218";
if (ver_compare(ver:version, fix:fixed_version, strict:FALSE) < 0)
{
  port = get_kb_item("SMB/transport");
  if (!port)
    port = 445;

  report =
    '\n  Path              : ' + path +
    '\n  Installed version : ' + version +
    '\n  Fixed version     : ' + fixed_version + '\n';

  security_report_v4(port:port, extra:report, severity:SECURITY_HOLE);
  exit(0);
}
else
   audit(AUDIT_INST_PATH_NOT_VULN, app, version, path);

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

EPSS

0.058

Percentile

93.4%

Related for FOXIT_READER_4_3_1_0218.NASL