Security restrictions bypass in Foxit PDF Reader for Windows and Foxit PDF Editor (formerly Foxit PhantomPDF) - #VU7305
Published: July 4, 2017
Vulnerability identifier: #VU7305
CSH Severity: High
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: N/A
CWE-ID: CWE-264
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: Foxit Software Inc.
Affected software:
Foxit PDF Reader for Windows
Foxit PDF Editor (formerly Foxit PhantomPDF)
Foxit PDF Reader for Windows
Foxit PDF Editor (formerly Foxit PhantomPDF)
Detailed vulnerability description
The vulnerability allows a remote attacker to bypass intended security restrictions.
The vulnerability exists due to unspecified error, which can lead to execution of JavaScript code within PDF file, even when JavaScript Actions in Trust Manager are disabled. A remote attacker can create a specially crafted PDF file, trick the victim into opening it and compromise vulnerable system.
Successful exploitation of the vulnerability may allow an attacker to execute arbitrary code on the target system with privileges of the current user.
The vulnerability exists due to unspecified error, which can lead to execution of JavaScript code within PDF file, even when JavaScript Actions in Trust Manager are disabled. A remote attacker can create a specially crafted PDF file, trick the victim into opening it and compromise vulnerable system.
Successful exploitation of the vulnerability may allow an attacker to execute arbitrary code on the target system with privileges of the current user.
Remediation
Update to version 8.3.1.