TIP: Click on subject to list as thread! ANSI
echo: win95
to: all
from: mark lewis
date: 2016-07-01 15:24:54
subject: 400 million Foxit users need to catch up with patched-up reader

http://www.theregister.co.uk/2016/07/01/foxit_patches_756/

===== snip =====

Makers of popular PDF reader Foxit have patched 12 dangerous
vulnerabilities that could have resulted in remote code execution.

Some 400 million users run the flagship reader billed as an alternative to
Adobe Reader. The dozen flaws (
http://www.zerodayinitiative.com/advisories/published/ ) are patched in
Windows and Linux variants.

Users would need to be conned into opening a malicious PDF with Foxit
Reader or PhantomPDF in order to be compromised using the vulnerabilities.

Seven of the patched holes allowed direct remote code execution while the
remainder required chaining with other flaws to achieve the level of
compromise.

Foxit listed six of the flaws in an advisory.

Version 8 of Reader and PhantomPDF plug the flaws:

  * ConvertToPDF TIFF Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
  * ConvertToPDF BMP Parsing Out-Of-Bounds Read Information Disclosure Vulnerability
  * ConvertToPDF GIF Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
  * JPEG Parsing Out-Of-Bounds Read Information Disclosure Vulnerability
  * JPEG Parsing Out-Of-Bounds Read Information Disclosure Vulnerability
  * ConvertToPDF TIFF Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
  * exportData Restrictions Bypass Remote Code Execution Vulnerability
  * Safe Mode Bypass Information Disclosure Vulnerability
  * FlateDecode Use-After-Free Remote Code Execution Vulnerability
  * Pattern Uninitialized Pointer Remote Code Execution Vulnerability
  * FlateDecode Use-After-Free Remote Code Execution Vulnerability
  * GoToR action Stack Buffer Overflow Remote Code Execution Vulnerability

(R)

===== snip =====

)\/(ark

Always Mount a Scratch Monkey

... Designed for dumbasses with lots of disposable income who believe ads.
---
* Origin: (1:3634/12.73)
SEEN-BY: 103/705 109/500 116/116 120/544 123/5 52 140 400 500 789 124/5013
SEEN-BY: 124/5014 135/300 138/146 140/1 14 153/7715 154/10 201/0 203/0 2 412
SEEN-BY: 211/37 221/0 1 6 360 226/600 227/51 229/426 230/0 249/303 261/38 1466
SEEN-BY: 266/404 512 275/100 280/464 5003 288/34 320/119 219 322/759 342/11 17
SEEN-BY: 342/77 423/81 120 633/267 280 640/384 712/620 848 770/1 2320/100
SEEN-BY: 3634/12 22 27 50 3828/7 5020/1042
@PATH: 3634/12 123/500 140/1 221/0 1 203/0 280/464 712/848 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.