Operating System:

[Win]

Published:

24 April 2017

Protect yourself against future threats.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
                         AUSCERT Security Bulletin

                               ASB-2017.0062
          Multiple vulnerabilities have been identified in Foxit
                        Reader and Foxit PhantomPDF
                               24 April 2017

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              Foxit Reader
                      Foxit PhantomPDF
Operating System:     Windows
Impact/Access:        Execute Arbitrary Code/Commands -- Remote with User Interaction
                      Denial of Service               -- Remote with User Interaction
Resolution:           Patch/Upgrade
Member content until: Wednesday, May 24 2017

OVERVIEW

        Multiple vulnerabilities have been identified in Foxit Reader and Foxit
        PhantomPDF prior to version 8.3. [1]


IMPACT

        Foxit has provided the following details about the security 
        vulnerabilities:
        
        "Addressed potential issues where the application could be exposed to
        Use-After-Free vulnerabilities, which could be exploited by 
        attackers to execute remote code.
        	
        Steven Seeley (mr_me) of Offensive Security working with Trend Micro's 
        Zero Day Initiative Dmitri Kaslov
        
        Addressed potential issues where the application could be exposed to a
        JPEG2000 Parsing Out-of-Bounds Write vulnerability, which could lead to
        remote code execution.
        	
        Toan Pham Van working with Trend Micro's Zero Day Initiative
        
        Addressed a potential issue where the application could be exposed to a
        null pointer vulnerability, which could lead to unexpected crash.
        	
        Dmitri Kaslov (PwC za-labs)" [1]


MITIGATION

        Foxit has provided an update to address these security issues. [1]


REFERENCES

        [1] Security updates available in Foxit Reader 8.3 and Foxit PhantomPDF
            8.3
            https://www.foxitsoftware.com/support/security-bulletins.php

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours 
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=ue1w
-----END PGP SIGNATURE-----