navigation bar left navigation bar right

Secunia CSI7
navigation left tab Advisories navigation right tab
navigation left tab Research navigation right tab
navigation left tab Forums navigation right tab
navigation left tab Create Profile navigation right tab
navigation left tab Our Commitment navigation right tab
PSI
PSI API
CSI
OSI
xSI
Vulnerabilities
Programs
Open Discussions
My Threads
Create Thread
Statistics
About

Forum Thread: Foxit Reader Plugin For Browsers URL Processing Buffer Overflow V...

You are currently viewing a forum thread in the Secunia Community Forum. Please note that opinions expressed here are not of Secunia but solely reflect those of the user who wrote it.

This thread was submitted in the following forum:
Vulnerabilities

See the original Secunia advisory:
Foxit Reader Plugin For Browsers URL Processing Buffer Overflow Vulnerability

Secunia Foxit Reader Plugin For Browsers URL Processing Buffer Overflow Vulnerability
Secunia Official 16th Jan, 2013 13:33
Ranking: 0
Posts: 0
User Since: -
System Score: -
Location: Copenhagen, DK
Andrea Micalizzi has discovered a vulnerability in Foxit Reader, which can be exploited by malicious people to compromise a user's system.

The vulnerability is caused due to a boundary error in the Foxit Reader plugin for browsers (npFoxitReaderPlugin.dll) when processing a URL and can be exploited to cause a stack-based buffer overflow via e.g. an overly long file name in the URL.

Successful exploitation allows execution of arbitrary code.

The vulnerability is confirmed in version 5.4.4.1128 (npFoxitReaderPlugin.dll version 2.2.1.530). Other versions may also be affected.

This user no longer exists RE: Foxit Reader Plugin For Browsers URL Processing Buffer Overflow Vulnerability
Member 16th Jan, 2013 13:33
Last edited on 16th Jan, 2013 13:33 Foxit has published a patch on the 14th. See http://www.foxitsoftware.com/support/security_bull... When I was viewing a PDF in the stand-alone version, Foxit offered the update to me, and installed the browser plugin, apparently without changing the standaloone mother program.
Was this reply relevant?
+0
-0
klausus02 RE: Foxit Reader Plugin For Browsers URL Processing Buffer Overflow Vulnerability
Member 16th Jan, 2013 15:51
Score: 4
Posts: 74
User Since: 4th Feb 2011
System Score: N/A
Location: DE
on 16th Jan, 2013 13:33, wrote:
Foxit has published a patch on the 14th. See http://www.foxitsoftware.com/support/security_bull... When I was viewing a PDF in the stand-alone version, Foxit offered the update to me, and installed the browser plugin, apparently without changing the standaloone mother program.



I can't find this in the provided link. I only read that FOXIT Advanced PDF Editor 3.0.4.0 is fixed.

-- regards

Was this reply relevant?
+0
-0

layohei

RE: Foxit Reader Plugin For Browsers URL Processing Buffer Overflow Vulnerability
[+]
This reply has been deleted
happywalrus RE: Foxit Reader Plugin For Browsers URL Processing Buffer Overflow Vulnerability
Member 17th Jan, 2013 16:04
Score: 0
Posts: 6
User Since: 18th Dec 2012
System Score: N/A
Location: RU
Last edited on 17th Jan, 2013 16:05
Official bulletin: http://www.foxitsoftware.com/support/security_bull...
Was this reply relevant?
+0
-0
taffy078 RE: Foxit Reader Plugin For Browsers URL Processing Buffer Overflow Vulnerability
Contributor 29th Jan, 2013 08:24
Score: 408
Posts: 1,352
User Since: 26th Feb 2009
System Score: 100%
Location: UK
Further problems - update here http://secunia.com/community/forum/thread/show/137... I'm sure Secunia will quickly update.

--
taffy078, West Yorkshire, UK

Desktop: Compaq Presario (OEM) 32 bit / AMD Athlon / 2 GB RAM
XP Home - SP3/ IE8/ Norton IS - Secunia PSI v2.0.0.3003

Laptop: Win 7 / IE11 / PSI v2.0.0.3003
Was this reply relevant?
+0
-0


 Products Solutions Customers Partner Resources Company
 
 Corporate
Vulnerability Intelligence Manager (VIM)
Corporate Software Inspector (CSI)
Consumer
Personal Software Inspector (PSI)
Online Software Inspector (OSI)
 Industry
Compliance
Technology
Integration
 Customers
Testimonials
 MSSP
Technology Partners
References
 Reports
Webinars
Events
 About us
Careers
Memberships
Newsroom


Secunia is a member of FIRST Secunia is a member of EDUcause Secunia is a member of The Open Group Secunia is a member of FS-ISAC
 
Secunia © 2002-2014 Secunia ApS - Rued Langgaards Vej 8, 4th floor, DK-2300 Copenhagen, Denmark - +45 7020 5144
Terms & Conditions and Copyright - Privacy - Report Vulnerability - Disclaimer
follow Secunia on Facebook follow Secunia on Twitter follow Secunia on LinkedIn follow Secunia on YouTube follow Secunia Xing follow Secunias RSS feed follow Secunia on Google+