BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to the Zeroday Tracker: Your Vulnerability Watchlist

Get critical updates on the latest zeroday threats, including impact, mitigation and protection information - only from BeyondTrust.

Foxit Reader Firefox Plugin Buffer Overflow

Disclosed January 7, 2013    Fully Patched

Vulnerability Description:

The Foxit Reader Firefox plugin contains a vulnerability caused by a boundary error when reading in an overly long filename within an URL. This causes a stack-based buffer overflow that may be leveraged to remotely execute code within the context of the currently logged on user. 

Vendors:

Foxit Corporation

Vulnerable Software/Devices:

Foxit Reader 5.4.4.1128 and possibly previous versions (npFoxitReaderPlugin.dll 2.2.1.530 for Firefox)
Foxit PhantomPDF 5.4.2 and possibly previous versions (npFoxitReaderPlugin.dll 2.2.1.530 for Firefox)

Vulnerability Severity:

High

Exploit Availability:

N/A

Exploit Impact:

Remote Code Execution
Remote Code Execution Exploitation of this vulnerability is possible via maliciously crafted PDF documents. Attackers who successfully exploit this vulnerability will be able to execute code on the vulnerable system with the same rights as the currently logged on user.

BeyondTrust Prevention and Detection:

BeyondTrust's Retina® Network Security Scanner scans devices to detect for this vulnerability.

  • 18010 - Foxit Reader Firefox Plugin Buffer Overflow (20130108)

Mitigation:

Update Foxit Reader to 5.4.5 and Foxit PhantomPDF to 5.4.3, both of which contain the updated Firefox plugin (npFoxitReaderPlugin.dll 2.2.3.111).

Links:

CVE(s):

None