Vulnerabilities > CVE-2011-0332 - Numeric Errors vulnerability in Foxitsoftware Foxit Phantom and Foxit Reader

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN

Summary

Integer overflow in Foxit Reader before 4.3.1.0218 and Foxit Phantom before 2.3.3.1112 allows remote attackers to execute arbitrary code via crafted ICC chunks in a PDF file, which triggers a heap-based buffer overflow.

Common Weakness Enumeration (CWE)

Nessus

NASL familyWindows
NASL idFOXIT_READER_4_3_1_0218.NASL
descriptionThe version of Foxit Reader installed on the remote Windows host is prior to 4.3.1.0218. It is, therefore, affected by multiple vulnerabilities : - An integer overflow condition exists when parsing certain ICC chunks. An attacker can exploit this, via crafted ICC chunks in a PDF file, to cause a heap-based buffer overflow, resulting in the execution of arbitrary code. (CVE-2011-0332) - A flaw exists in the JavaScript API related to the createDataObject() function. An attacker can exploit this, via a crafted PDF file using a call to that function, to create or overwrite arbitrary files.
last seen2020-06-01
modified2020-06-02
plugin id52458
published2011-02-25
reporterThis script is Copyright (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/52458
titleFoxit Reader < 4.3.1.0218 Multiple Vulnerabilities
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(52458);
  script_version("1.14");
  script_cvs_date("Date: 2019/01/02 11:18:37");

  script_cve_id("CVE-2011-0332");
  script_bugtraq_id(46565, 46763);
  script_xref(name:"EDB-ID", value:"16978");
  script_xref(name:"Secunia", value:"43329");
  script_xref(name:"Secunia", value:"43776");

  script_name(english:"Foxit Reader < 4.3.1.0218 Multiple Vulnerabilities");
  script_summary(english:"Checks the version of Foxit Reader.");

  script_set_attribute(attribute:"synopsis", value:
"A PDF viewer installed on the remote host is affected by multiple
vulnerabilities.");
  script_set_attribute(attribute:"description", value:
"The version of Foxit Reader installed on the remote Windows host is
prior to 4.3.1.0218. It is, therefore, affected by multiple
vulnerabilities :

  - An integer overflow condition exists when parsing
    certain ICC chunks. An attacker can exploit this, via
    crafted ICC chunks in a PDF file, to cause a heap-based
    buffer overflow, resulting in the execution of arbitrary
    code. (CVE-2011-0332)

  - A flaw exists in the JavaScript API related to the
    createDataObject() function. An attacker can exploit
    this, via a crafted PDF file using a call to that
    function, to create or overwrite arbitrary files.
");
  # https://scarybeastsecurity.blogspot.com/2011/03/dangerous-file-write-bug-in-foxit-pdf.html
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?8294358a");
  script_set_attribute(attribute:"see_also", value:"https://www.foxitsoftware.com/support/security-bulletins.php");
  script_set_attribute(attribute:"see_also", value:"https://www.foxitsoftware.com/company/press.php?id=210");
  script_set_attribute(attribute:"solution", value:
"Upgrade to Foxit Reader version 4.3.1.0218 or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");
  script_set_attribute(attribute:"metasploit_name", value:'Foxit PDF Reader 4.2 Javascript File Write');
  script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");
  
  script_set_attribute(attribute:"vuln_publication_date", value:"2011/02/25");
  script_set_attribute(attribute:"patch_publication_date", value:"2011/02/24");
  script_set_attribute(attribute:"plugin_publication_date", value:"2011/02/25");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe",value:"cpe:/a:foxitsoftware:foxit_reader");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Windows");

  script_copyright(english:"This script is Copyright (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("foxit_reader_installed.nasl");
  script_require_keys("installed_sw/Foxit Reader");

  exit(0);
}

include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("install_func.inc");

app = "Foxit Reader";
install = get_single_install(app_name:app, exit_if_unknown_ver:TRUE);
version = install["version"];
path    = install["path"];

report = NULL;

fixed_version = "4.3.1.0218";
if (ver_compare(ver:version, fix:fixed_version, strict:FALSE) < 0)
{
  port = get_kb_item("SMB/transport");
  if (!port)
    port = 445;

  report =
    '\n  Path              : ' + path +
    '\n  Installed version : ' + version +
    '\n  Fixed version     : ' + fixed_version + '\n';

  security_report_v4(port:port, extra:report, severity:SECURITY_HOLE);
  exit(0);
}
else
   audit(AUDIT_INST_PATH_NOT_VULN, app, version, path);

Seebug

bulletinFamilyexploit
descriptionBUGTRAQ ID: 46565 CVE ID: CVE-2011-0332 Foxit Reader是一款小型的PDF文档查看器和打印程序。 Foxit Reader在实现上存在ICC解析远程整数溢出漏洞,攻击者可利用此漏洞在受影响应用程序中执行任意代码,造成拒绝服务。 此漏洞源于在解析某些ICC块时的整数溢出错误,可通过特制的文件造成堆缓冲区溢出。 Foxit Foxit Reader 4.3.1.0118 厂商补丁: Foxit ----- 目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载: http://www.foxitsoft.com/wac/server_intro.php
idSSV:20345
last seen2017-11-19
modified2011-03-02
published2011-03-02
reporterRoot
titleFoxit Reader ICC解析远程整数溢出漏洞