Multiple vulnerabilities in Foxit Reader and PhantomPDF



Published: 2020-09-30 | Updated: 2020-10-07
Risk High
Patch available YES
Number of vulnerabilities 14
CVE-ID CVE-2020-26534
CVE-2020-26535
CVE-2020-26536
CVE-2020-26537
CVE-2020-26538
CVE-2020-17413
CVE-2020-17417
CVE-2020-17416
CVE-2020-17415
CVE-2020-17414
CVE-2020-17412
CVE-2020-17411
CVE-2020-17410
CWE-ID CWE-416
CWE-787
CWE-476
CWE-426
CWE-121
CWE-276
CWE-125
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Foxit PDF Editor (formerly Foxit PhantomPDF)
Client/Desktop applications / Office applications

Foxit PDF Reader for Windows
Client/Desktop applications / Office applications

Vendor Foxit Software Inc.

Security Bulletin

This security bulletin contains information about 14 vulnerabilities.

Updated: 07.10.2020

Assigned CVE-IDs for vulnerabilities #1-5.

1) Use-after-free

EUVDB-ID: #VU47135

Risk: High

CVSSv3.1:

CVE-ID: CVE-2020-26534

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a use-after-free error when using the Opt object after it has been deleted by calling Field::ClearItems method while executing Field::DeleteOptions method. A remote attacker can create a specially crafted PDF file, trigger a use-after-free error and execute arbitrary code on the system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Foxit PDF Editor (formerly Foxit PhantomPDF): 10.0.0.35798 - 10.0.1.35811, 9.0 - 9.7.3.29555

Foxit PDF Reader for Windows: 9.0 - 10.0.1.35811


CPE2.3 External links

http://www.foxitsoftware.com/support/security-bulletins.html#10.1

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?

2) Out-of-bounds write

EUVDB-ID: #VU47137

Risk: High

CVSSv3.1:

CVE-ID: CVE-2020-26535

CWE-ID: CWE-787 - Out-of-bounds Write

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error when processing untrusted input within the V8 JavaScript engine, which is resulted from the failure to properly handle the situation where the Index returned during the allocation of thread local storage by TslAlloc function exceeds the limits acceptable by the V8 JavaScript engine. A remote attacker can create a specially crafted PDF file, trick the victim into opening it using the affected software, trigger out-of-bounds write and execute arbitrary code on the target system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Foxit PDF Reader for Windows: 9.0 - 10.0.1.35811

Foxit PDF Editor (formerly Foxit PhantomPDF): 10.0.0.35798 - 10.0.1.35811, 9.0 - 9.7.3.29555


CPE2.3 External links

http://www.foxitsoftware.com/support/security-bulletins.html#10.1

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?

3) NULL pointer dereference

EUVDB-ID: #VU47138

Risk: High

CVSSv3.1:

CVE-ID: CVE-2020-26536

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to a NULL pointer dereference error when processing PDF files. A remote attacker can create a specially crafted PDF file, trick the victim into opening it, trigger a NULL pointer dereference error and execute arbitrary code on the system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Foxit PDF Reader for Windows: 9.0 - 10.0.1.35811

Foxit PDF Editor (formerly Foxit PhantomPDF): 10.0.0.35798 - 10.0.1.35811, 9.0 - 9.7.3.29555


CPE2.3 External links

http://www.foxitsoftware.com/support/security-bulletins.html#10.1

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?

4) Out-of-bounds write

EUVDB-ID: #VU47161

Risk: High

CVSSv3.1:

CVE-ID: CVE-2020-26537

CWE-ID: CWE-787 - Out-of-bounds Write

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error within the handling of Shading. A remote attacker can create a specially crafted PDF file, trick the victim into opening it using the affected software, trigger out-of-bounds write and execute arbitrary code on the target system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Foxit PDF Reader for Windows: 9.0 - 10.0.1.35811

Foxit PDF Editor (formerly Foxit PhantomPDF): 10.0.0.35798 - 10.0.1.35811, 9.0 - 9.7.3.29555


CPE2.3 External links

http://www.foxitsoftware.com/support/security-bulletins.html#10.1

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?

5) Untrusted search path

EUVDB-ID: #VU47162

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2020-26538

CWE-ID: CWE-426 - Untrusted Search Path

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists during application installation, as the installer file searches for taskkill.exe in the current working directory. A remote attacker can trick the victim to launch the installer file from a remote SMB share and execute arbitrary code on the system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Foxit PDF Reader for Windows: 9.0 - 10.0.1.35811

Foxit PDF Editor (formerly Foxit PhantomPDF): 10.0.0.35798 - 10.0.1.35811, 9.0 - 9.7.3.29555


CPE2.3 External links

http://www.foxitsoftware.com/support/security-bulletins.html#10.1

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?

6) Stack-based buffer overflow

EUVDB-ID: #VU47143

Risk: High

CVSSv3.1:

CVE-ID: CVE-2020-17413

CWE-ID: CWE-121 - Stack-based Buffer Overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error within the handling of U3D objects embedded in PDF files. A remote unauthenticated attacker can create a specially crafted PDF file, trick the victim into opening it, trigger stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Foxit PDF Editor (formerly Foxit PhantomPDF): 10.0.0.35798 - 10.0.1.35811, 9.0 - 9.7.3.29555

Foxit PDF Reader for Windows: 9.0 - 10.0.1.35811


CPE2.3 External links

http://www.zerodayinitiative.com/advisories/ZDI-20-1235/
http://www.foxitsoftware.com/support/security-bulletins.html#10.1

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?

7) Use-after-free

EUVDB-ID: #VU47154

Risk: High

CVSSv3.1:

CVE-ID: CVE-2020-17417

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a use-after-free error within the handling of the Annotation objects while processing AcroForm. A remote attacker can create a specially crafted PDF file, trick the victim into opening it, trigger a use-after-free error and execute arbitrary code on the system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Foxit PDF Reader for Windows: 9.0 - 10.0.1.35811

Foxit PDF Editor (formerly Foxit PhantomPDF): 10.0.0.35798 - 10.0.1.35811, 9.0 - 9.7.3.29555


CPE2.3 External links

http://www.zerodayinitiative.com/advisories/ZDI-20-1234/
http://www.foxitsoftware.com/support/security-bulletins.html

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?

8) Out-of-bounds write

EUVDB-ID: #VU47155

Risk: High

CVSSv3.1:

CVE-ID: CVE-2020-17416

CWE-ID: CWE-787 - Out-of-bounds Write

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error when processing JPEG2000 images within PDF files. A remote attacker can create a specially crafted PDF file, trick the victim into opening it using the affected software, trigger out-of-bounds write and execute arbitrary code on the target system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Foxit PDF Reader for Windows: 9.0 - 10.0.1.35811

Foxit PDF Editor (formerly Foxit PhantomPDF): 10.0.0.35798 - 10.0.1.35811, 9.0 - 9.7.3.29555


CPE2.3 External links

http://www.zerodayinitiative.com/advisories/ZDI-20-1233/
http://www.foxitsoftware.com/support/security-bulletins.html

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?

9) Incorrect default permissions

EUVDB-ID: #VU47156

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2020-17415

CWE-ID: CWE-276 - Incorrect Default Permissions

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to incorrect default permissions for the configuration files used by the Foxit PhantomPDF Update Service. A local user with access to the system can view contents of files and directories or modify them.

Successful exploitation of the vulnerability may allow an attacker to execute arbitrary code with SYSTEM privileges.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Foxit PDF Reader for Windows: 9.0 - 10.0.1.35811

Foxit PDF Editor (formerly Foxit PhantomPDF): 10.0.0.35798 - 10.0.1.35811, 9.0 - 9.7.3.29555


CPE2.3 External links

http://www.zerodayinitiative.com/advisories/ZDI-20-1232/
http://www.foxitsoftware.com/support/security-bulletins.html

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?

10) Incorrect default permissions

EUVDB-ID: #VU47157

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2020-17414

CWE-ID: CWE-276 - Incorrect Default Permissions

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to incorrect default permissions for the configuration files used by the Foxit Reader Update Service. A local user with access to the system can view contents of files and directories or modify them.

Successful exploitation of the vulnerability may allow an attacker to execute arbitrary code with SYSTEM privileges.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Foxit PDF Reader for Windows: 9.0 - 10.0.1.35811


CPE2.3 External links

http://www.zerodayinitiative.com/advisories/ZDI-20-1231/
http://www.foxitsoftware.com/support/security-bulletins.html

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?

11) Out-of-bounds write

EUVDB-ID: #VU47158

Risk: High

CVSSv3.1:

CVE-ID: CVE-2020-17412

CWE-ID: CWE-787 - Out-of-bounds Write

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error within the handling of U3D objects embedded in PDF files within U3DBrowser. A remote attacker can create a specially crafted PDF file, trick the victim into opening it using the affected software, trigger out-of-bounds write and execute arbitrary code on the target system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Foxit PDF Editor (formerly Foxit PhantomPDF): 10.0.0.35798 - 10.0.1.35811, 9.0 - 9.7.3.29555


CPE2.3 External links

http://www.zerodayinitiative.com/advisories/ZDI-20-1230/
http://www.foxitsoftware.com/support/security-bulletins.html

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?

12) Out-of-bounds read

EUVDB-ID: #VU47159

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2020-17411

CWE-ID: CWE-125 - Out-of-bounds Read

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition within the handling of U3D objects embedded in PDF files in U3DBrowser. A remote attacker can create a specially crafted PDF file, trick the victim into opening it, trigger out-of-bounds read error and read contents of memory on the system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Foxit PDF Editor (formerly Foxit PhantomPDF): 10.0.0.35798 - 10.0.1.35811, 9.0 - 9.7.3.29555


CPE2.3 External links

http://www.zerodayinitiative.com/advisories/ZDI-20-1229/
http://www.foxitsoftware.com/support/security-bulletins.html

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?

13) Use-after-free

EUVDB-ID: #VU47160

Risk: High

CVSSv3.1:

CVE-ID: CVE-2020-17410

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a use-after-free error within the parsing of GIF files. A remote attacker can create a specially crafted PDF file, trick the victim into opening it, trigger a use-after-free error and execute arbitrary code on the system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Foxit PDF Editor (formerly Foxit PhantomPDF): 10.0.0.35798 - 10.0.1.35811, 9.0 - 9.7.3.29555


CPE2.3 External links

http://www.zerodayinitiative.com/advisories/ZDI-20-1228/
http://www.foxitsoftware.com/support/security-bulletins.html

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?

14) Use-after-free

EUVDB-ID: #VU47163

Risk: High

CVSSv3.1:

CVE-ID: N/A

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a use-after-free error while using the /V item, which is deleted after being interpreted as the action executed during validation when it exists in both Additional Action and Field dictionaries but shares different interpretations. A remote attacker can create a specially crafted PDF file, trick the victim into opening it, trigger a use-after-free error and execute arbitrary code on the system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Foxit PDF Reader for Windows: 9.0 - 10.0.1.35811

Foxit PDF Editor (formerly Foxit PhantomPDF): 10.0.0.35798 - 10.0.1.35811, 9.0 - 9.7.3.29555


CPE2.3 External links

http://www.foxitsoftware.com/support/security-bulletins.html#10.1

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?



###SIDEBAR###