Advisories
Research
Forums
Create Profile
Our Commitment
Database
Search
Advisories by Product
Advisories by Vendor
Terminology
Report Vulnerability
Insecure Library Loading
Highly critical

Foxit Reader / PhantomPDF Plugin For Browsers URL Processing Buffer Overflow Vulnerability

-

Release Date:  2013-01-08    Last Update:  2013-02-08    Views:  66,143

Secunia Advisory SA51733

Where:

You need to log in to view this

Impact:

You need to log in to view this

Solution Status:

You need to log in to view this

Software:

You need to log in to view this

CVE Reference(s):

You need to log in to view this

Description


Andrea Micalizzi has reported a vulnerability in Foxit Reader and Foxit PhantomPDF, which can be exploited by malicious people to compromise a user's system


You need to log in to the Secunia Community to view the full description of this advisory

If you are not a member of the Secunia community, you can sign up here for free.

Do you have additional information related to this advisory?

Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this information to vuln@secunia.com

Subject: Foxit Reader / PhantomPDF Plugin For Browsers URL Processing Buffer Overflow Vulnerability

User Message
This user no longer exists RE: Foxit Reader Plugin For Browsers URL Processing Buffer Overflow Vulnerability
Member 16th Jan, 2013 13:33
Last edited on 16th Jan, 2013 13:33 Foxit has published a patch on the 14th. See http://www.foxitsoftware.com/support/security_bull... When I was viewing a PDF in the stand-alone version, Foxit offered the update to me, and installed the browser plugin, apparently without changing the standaloone mother program.
Was this reply relevant?
+0
-0
klausus02 RE: Foxit Reader Plugin For Browsers URL Processing Buffer Overflow Vulnerability
Member 16th Jan, 2013 15:51
Score: 4
Posts: 73
User Since: 4th Feb 2011
System Score: N/A
Location: DE
(unknown source)
Foxit has published a patch on the 14th. See http://www.foxitsoftware.com/support/security_bull... When I was viewing a PDF in the stand-alone version, Foxit offered the update to me, and installed the browser plugin, apparently without changing the standaloone mother program.



I can't find this in the provided link. I only read that FOXIT Advanced PDF Editor 3.0.4.0 is fixed.

-- regards

Was this reply relevant?
+0
-0

layohei

RE: Foxit Reader Plugin For Browsers URL Processing Buffer Overflow Vulnerability
[+]
This reply has been deleted
happywalrus RE: Foxit Reader Plugin For Browsers URL Processing Buffer Overflow Vulnerability
Member 17th Jan, 2013 16:04
Score: 0
Posts: 6
User Since: 18th Dec 2012
System Score: N/A
Location: RU
Last edited on 17th Jan, 2013 16:05
Official bulletin: http://www.foxitsoftware.com/support/security_bull...
Was this reply relevant?
+0
-0
taffy078 RE: Foxit Reader Plugin For Browsers URL Processing Buffer Overflow Vulnerability
Contributor 29th Jan, 2013 08:24
Score: 408
Posts: 1,340
User Since: 26th Feb 2009
System Score: 100%
Location: UK
Further problems - update here http://secunia.com/community/forum/thread/show/137... I'm sure Secunia will quickly update.

--
taffy078, West Yorkshire, UK

Desktop: Compaq Presario (OEM) 32 bit / AMD Athlon / 2 GB RAM
XP Home - SP3/ IE8/ Norton IS - Secunia PSI v2.0.0.3003

Laptop: Win 7 / IE11 / PSI v2.0.0.3003
Was this reply relevant?
+0
-0

-

You must be logged in to post a comment.



 Products Solutions Customers Partner Resources Company
 
 Corporate
Vulnerability Intelligence Manager (VIM)
Corporate Software Inspector (CSI)
Consumer
Personal Software Inspector (PSI)
Online Software Inspector (OSI)
 Industry
Compliance
Technology
Integration
 Customers
Testimonials
 VARS
MSSP
Technology Partners
References
 Reports
Webinars
Events
 About us
Careers
Memberships
Newsroom


 
© 2002-2014 Secunia ApS - Rued Langgaards Vej 8, 4th floor, DK-2300 Copenhagen, Denmark - +45 7020 5144
Terms & Conditions and Copyright - Privacy - Report Vulnerability - Disclaimer