SRC-2018-0013 : Foxit Reader PDF Parsing U3D Out-of-Bounds Write Remote Code Execution Vulnerability
CVE ID:
CVE-2018-5675
CVSS Score:
6.8, (AV:N/AC:M/Au:N/C:P/I:P/A:P)
Affected Vendors:
Foxit
Affected Products:
Foxit Reader and Foxit PhantomPDF
Vulnerability Details:
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of embedded U3D images inside of PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code under the context of the current process.
Vendor Response:
Foxit has issued an update to correct these vulnerabilities. More details can be found at:
https://www.foxitsoftware.com/support/security-bulletins.php
Disclosure Timeline:
- 2018-01-25 – Verified and sent to Foxit
- 2018-04-27 – Coordinated public release of advisory
Credit:
This vulnerability was discovered by Steven Seeley (mr_me) of Source Incite