BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to the Zeroday Tracker: Your Vulnerability Watchlist

Get critical updates on the latest zeroday threats, including impact, mitigation and protection information - only from BeyondTrust.

Multiple Remote Code Execution Vulnerabilities in Corel PDF Fusion

Disclosed July 8, 2013    Zeroday : 481 days

Vulnerability Description:

Two vulnerabilities exist in Corel PDF Fusion. The first vulnerability is a DLL hijacking vulnerability targeting wintab32.dll that occurs when opening PDF or XPS files on a WebDAV or SMB share. The second vulnerability is a stack-based buffer overflow that can occur when parsing filenames in ZIP directory entries of an XPS file.

Vendors:

Corel

Vulnerable Software/Devices:

Corel PDF Fusion 1.11 and prior

Vulnerability Severity:

High

Exploit Availability:

Publicly Available

Exploit Impact:

Remote Code Execution
Exploitation of these vulnerabilities is possible through the use of methods like drive-by attacks. Remote attackers who successfully exploit this vulnerability will be able to execute code on the vulnerable system with the same rights as the currently logged on user.

BeyondTrust Prevention and Detection:

BeyondTrust's Retina® Network Security Scanner scans devices to detect for this vulnerability.

  • 19621 - Corel PDF Fusion Multiple Vulnerabilities (Zero-Day)

Mitigation:

To mitigate the WebDAV vulnerability, disable WebClient (WebDAV), and block TCP ports 139 and 445.

Links:

CVE(s):