All use of Secunia Advisories is for non-commercial use only. No use is permitted for commercial use. For further information, see the End User License Agreement or contact us. If you are an IT security professional, request a trial of the Secunia VIM.

 
Highly critical

Foxit Reader / PhantomPDF Plugin For Browsers URL Processing Buffer Overflow Vulnerability

-

Release Date:  2013-01-08    Last Update:  2013-02-08    Views:  87,436

Secunia Advisory SA51733

Where:

Log in with your Secunia community profile. If you are an IT security professional, request a trial of the Secunia VIM.

Impact:

Log in with your Secunia community profile. If you are an IT security professional, request a trial of the Secunia VIM.

Solution Status:

Log in with your Secunia community profile. If you are an IT security professional, request a trial of the Secunia VIM.

Software:

Log in with your Secunia community profile. If you are an IT security professional, request a trial of the Secunia VIM.

CVE Reference(s):

Log in with your Secunia community profile. If you are an IT security professional, request a trial of the Secunia VIM.

Description


Andrea Micalizzi has reported a vulnerability in Foxit Reader and Foxit PhantomPDF, which can be exploited by malicious people to compromise a user's system


Log in with your Secunia community profile to view the full description of this Advisory. If you are an IT security professional, request a trial of the Secunia VIM.

If you are not a member of the Secunia community, you can sign up here for free.

Do you have additional information related to this advisory?

Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this information to vuln@secunia.com

Subject: Foxit Reader / PhantomPDF Plugin For Browsers URL Processing Buffer Overflow Vulnerability

User Message
This user no longer exists RE: Foxit Reader Plugin For Browsers URL Processing Buffer Overflow Vulnerability
Member 16th Jan, 2013 13:33
Last edited on 16th Jan, 2013 13:33 Foxit has published a patch on the 14th. See http://www.foxitsoftware.com/support/security_bull... When I was viewing a PDF in the stand-alone version, Foxit offered the update to me, and installed the browser plugin, apparently without changing the standaloone mother program.
Was this reply relevant?
+0
-0
klausus02 RE: Foxit Reader Plugin For Browsers URL Processing Buffer Overflow Vulnerability
Member 16th Jan, 2013 15:51
Score: 4
Posts: 98
User Since: 4th Feb 2011
System Score: N/A
Location: DE
(unknown source)
Foxit has published a patch on the 14th. See http://www.foxitsoftware.com/support/security_bull... When I was viewing a PDF in the stand-alone version, Foxit offered the update to me, and installed the browser plugin, apparently without changing the standaloone mother program.



I can't find this in the provided link. I only read that FOXIT Advanced PDF Editor 3.0.4.0 is fixed.

-- regards

Was this reply relevant?
+0
-0

layohei

RE: Foxit Reader Plugin For Browsers URL Processing Buffer Overflow Vulnerability
[+]
This reply has been deleted
happywalrus RE: Foxit Reader Plugin For Browsers URL Processing Buffer Overflow Vulnerability
Member 17th Jan, 2013 16:04
Score: 0
Posts: 6
User Since: 18th Dec 2012
System Score: N/A
Location: RU
Last edited on 17th Jan, 2013 16:05
Official bulletin: http://www.foxitsoftware.com/support/security_bull...
Was this reply relevant?
+0
-0
taffy078 RE: Foxit Reader Plugin For Browsers URL Processing Buffer Overflow Vulnerability
Contributor 29th Jan, 2013 08:24
Score: 408
Posts: 1,464
User Since: 26th Feb 2009
System Score: 100%
Location: UK
Further problems - update here http://secunia.com/community/forum/thread/show/137... I'm sure Secunia will quickly update.

--
taffy078, West Yorkshire, UK

HP Envy Win10 PC and Compaq Presario screwed up by forced upgrade to Win10 from WIn7
Was this reply relevant?
+0
-0

-

You must be logged in to post a comment.