Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT Security Bulletin ASB-2017.0062 Multiple vulnerabilities have been identified in Foxit Reader and Foxit PhantomPDF 24 April 2017 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Foxit Reader Foxit PhantomPDF Operating System: Windows Impact/Access: Execute Arbitrary Code/Commands -- Remote with User Interaction Denial of Service -- Remote with User Interaction Resolution: Patch/Upgrade Member content until: Wednesday, May 24 2017 OVERVIEW Multiple vulnerabilities have been identified in Foxit Reader and Foxit PhantomPDF prior to version 8.3. [1] IMPACT Foxit has provided the following details about the security vulnerabilities: "Addressed potential issues where the application could be exposed to Use-After-Free vulnerabilities, which could be exploited by attackers to execute remote code. Steven Seeley (mr_me) of Offensive Security working with Trend Micro's Zero Day Initiative Dmitri Kaslov Addressed potential issues where the application could be exposed to a JPEG2000 Parsing Out-of-Bounds Write vulnerability, which could lead to remote code execution. Toan Pham Van working with Trend Micro's Zero Day Initiative Addressed a potential issue where the application could be exposed to a null pointer vulnerability, which could lead to unexpected crash. Dmitri Kaslov (PwC za-labs)" [1] MITIGATION Foxit has provided an update to address these security issues. [1] REFERENCES [1] Security updates available in Foxit Reader 8.3 and Foxit PhantomPDF 8.3 https://www.foxitsoftware.com/support/security-bulletins.php AusCERT has made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBWP1354x+lLeg9Ub1AQg7Mw/8D+UEkcXelNXrYSJirp4M4dHZQvCPbOq7 ILCrJrhyNQpnCDvTHXbknKWqX4IXSd34EBmQGWyS+jNIfak3m3sZiRin7lC/GItH dHwTFeqNlZTxtkjhPaMeVJgdvO/MAAdtHTCbi+7QDRgVPXtcV5QgRZIFkuv6x0XZ AStiXEfbItnYab1fYM8YITk+5GZgZq6e/u/9JS8DC4g3Ktw0Z7ZuXv7Q9aEw7qNm O++b5Cssw76TmSTf4gOue5/+KhTku39MwqIbxmFS8v+SQglfeKFgPoH1y+WjU6x5 VR8+EjwbY6jBq0v5J9Wr4BopfzUMNHK5zjg066lfVR7PaB0tBSVj9K0M6VefmtV/ 7+W5cThlfXbW9AHUw13dULXxUYA+mcHXc96IwBZcdng5VnyoqGaBdq1aVBzk3d0J iTsil5lxPKN01VbGQqSq+pi34gPmfSCvQF6fO4WnzoG8sBUltCgp4DUIykgeC8Rj 0W/kWvc84LEQmF1gb61zzGaB+4O4F4ga7SEeZ3npnWzU4/Pvd4XZ4FjzFn0Rmssf XVkhAn+VF0wS+jp6oSD9h9zGrEuNqZODSbod6EmRpbaQasip28D9NbUBPNIq9ZRB ngF8gdqUo23aibstNx9tON/Cb9xvzfnuJuzVCqG43MOA2g+UH/pZiYfGL39hAlnZ jOmfqPsL2JQ= =ue1w -----END PGP SIGNATURE-----