#VU68902 Stack exhaustion in Foxit PDF Editor for Mac (formerly PhantomPDF) and Foxit Reader for Mac


Published: 2022-11-01

Vulnerability identifier: #VU68902

Vulnerability risk: Low

CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: N/A

CWE-ID: CWE-119

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Foxit PDF Editor for Mac (formerly PhantomPDF)
Client/Desktop applications / Office applications
Foxit Reader for Mac
Client/Desktop applications / Office applications

Vendor: Foxit Software Inc.

Description

The vulnerability allows a remote attacker to crash the application.

The vulnerability exists due to a boundary condition when handling certain PDF files containing a field that is formatted as “Percent” with an overly large value, or due to the infinite recursion resulting from the incorrect hierarchy structure of nodes when handling certain PDF or XFA files.. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger a buffer overflow and crash the application.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

Foxit PDF Editor for Mac (formerly PhantomPDF): 11.0.1.0719 - 12.0.1.0720

Foxit Reader for Mac: 12.0.0.0601 - 12.0.1.0720


External links
http://www.foxitsoftware.com/support/security-bulletins.html?Security+updates+available+in+Foxit+PDF+Editor+for+Mac+12.0.2+and+Foxit+PDF+Reader+for+Mac+12.0.2+2022-11-01+00%3A00%3A00


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability