The Foxit Reader Firefox plugin contains a vulnerability caused by a boundary error when reading in an overly long filename within an URL. This causes a stack-based buffer overflow that may be leveraged to remotely execute code within the context of the currently logged on user.
Foxit Reader 188.8.131.528 and possibly previous versions (npFoxitReaderPlugin.dll 184.108.40.2060 for Firefox)
Foxit PhantomPDF 5.4.2 and possibly previous versions (npFoxitReaderPlugin.dll 220.127.116.110 for Firefox)
Remote Code Execution
Remote Code Execution Exploitation of this vulnerability is possible via maliciously crafted PDF documents. Attackers who successfully exploit this vulnerability will be able to execute code on the vulnerable system with the same rights as the currently logged on user.
BeyondTrust Prevention and Detection:
BeyondTrust's Retina® Network Security Scanner scans devices to detect for this vulnerability.
- 18010 - Foxit Reader Firefox Plugin Buffer Overflow (20130108)
Update Foxit Reader to 5.4.5 and Foxit PhantomPDF to 5.4.3, both of which contain the updated Firefox plugin (npFoxitReaderPlugin.dll 18.104.22.168).