SRC-2016-0026 : Foxit Reader JPXDecode Out-of-Bounds Read Remote Code Execution Vulnerability
CVE ID:
CVSS Score:
6.8, (AV:N/AC:M/Au:N/C:P/I:P/A:P)
Affected Vendors:
Foxit
Affected Products:
Foxit Reader
Vulnerability Details:
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within JPXDecode PDF streams. A specially crafted PDF with a JPXDecode stream can force a Out-of-Bounds Read condition which can be used to later write Out-of-Bounds. An attacker can leverage this vulnerability to execute arbitrary code under the context of the current process.
Vendor Response:
Foxit has issued an update to correct this vulnerability. More details can be found at:
https://www.foxitsoftware.com/support/security-bulletins.php
Disclosure Timeline:
- 2016-07-25 – Vulnerability reported to vendor
- 2016-07-25 – Vulnerability confirmed by the vendor
- 2016-08-08 – Coordinated public release of advisory
Proof of Concept:
https://github.com/sourceincite/poc/blob/master/SRC-2016-0026.pdf
Credit:
This vulnerability was discovered by Steven Seeley of Source Incite