SRC-2016-0041 : Foxit Reader FlateDecode Use-After-Free Remote Code Execution Vulnerability

CVE ID:

CVE-2016-8604

CVSS Score:

6.8, (AV:N/AC:M/Au:N/C:P/I:P/A:P)

Affected Vendors:

Foxit

Affected Products:

Foxit Reader

Vulnerability Details:

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within FlateDecode. A specially crafted PDF with a specific FlateDecode stream can force a dangling pointer to be reused after it has been freed. An attacker could leverage this vulnerability to reach a switch statement and execute arbitrary code under the context of the current process.

Vendor Response:

Foxit has issued an update to correct this vulnerability. More details can be found at:
https://www.foxitsoftware.com/support/security-bulletins.php

Disclosure Timeline:

  • 2016-09-29 – Vulnerability reported to vendor
  • 2016-09-30 – Vulnerability confirmed by the vendor
  • 2016-10-18 – Coordinated public release of advisory

Proof of Concept:

https://github.com/sourceincite/poc/blob/master/SRC-2016-0041.pdf

Credit:

This vulnerability was discovered by Steven Seeley of Source Incite