Vulnerabilities > CVE-2018-3853 - Use After Free vulnerability in Foxitsoftware Foxit Reader 9.0.1.1049

047910
CVSS 8.8 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
HIGH
Integrity impact
HIGH
Availability impact
HIGH
network
low complexity
foxitsoftware
CWE-416
nessus

Summary

An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software Foxit PDF Reader version 9.0.1.1049. A specially crafted PDF document can trigger a previously freed object in memory to be reused resulting in arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. If the browser plugin extension is enabled, visiting a malicious site can also trigger the vulnerability.

Vulnerable Configurations

Part Description Count
Application
Foxitsoftware
1

Common Weakness Enumeration (CWE)

Nessus

  • NASL familyWindows
    NASL idFOXIT_PHANTOM_8_3_6.NASL
    descriptionAccording to its version, the Foxit PhantomPDF application (formally known as Phantom) installed on the remote Windows host is prior to 8.3.6. It is, therefore, affected by multiple vulnerabilities.
    last seen2020-06-01
    modified2020-06-02
    plugin id119837
    published2018-12-21
    reporterThis script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/119837
    titleFoxit PhantomPDF < 8.3.6 Multiple Vulnerabilities
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(119837);
      script_version("1.3");
      script_cvs_date("Date: 2019/10/31 15:18:52");
    
      script_cve_id(
        "CVE-2017-14458",
        "CVE-2017-17557",
        "CVE-2018-3842",
        "CVE-2018-3843",
        "CVE-2018-3850",
        "CVE-2018-3853",
        "CVE-2018-10302",
        "CVE-2018-10303"
      );
      script_bugtraq_id(103942, 103999);
    
      script_name(english:"Foxit PhantomPDF < 8.3.6 Multiple Vulnerabilities");
      script_summary(english:"Checks the version of Foxit PhantomPDF.");
    
      script_set_attribute(attribute:"synopsis", value:
    "A PDF toolkit installed on the remote Windows host is affected by
    multiple vulnerabilities.");
      script_set_attribute(attribute:"description", value:
    "According to its version, the Foxit PhantomPDF application (formally
    known as Phantom) installed on the remote Windows host is prior to
    8.3.6. It is, therefore, affected by multiple vulnerabilities.");
      # https://www.foxitsoftware.com/support/security-bulletins.php
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?2f244c3e");
      script_set_attribute(attribute:"solution", value:
    "Upgrade to Foxit PhantomPDF version 8.3.6 or later.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
      script_set_attribute(attribute:"cvss_score_source", value:"CVE-2018-3853");
    
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2018/05/07");
      script_set_attribute(attribute:"patch_publication_date", value:"2018/05/07");
      script_set_attribute(attribute:"plugin_publication_date", value:"2018/12/21");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:foxitsoftware:phantom");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:foxitsoftware:phantompdf");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Windows");
    
      script_copyright(english:"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
    
      script_dependencies("foxit_phantom_installed.nasl");
      script_require_keys("installed_sw/FoxitPhantomPDF");
    
      exit(0);
    }
    
    include('vcf.inc');
    
    app = 'FoxitPhantomPDF';
    
    app_info = vcf::get_app_info(app:app, win_local:TRUE);
    
    constraints = [{
      'min_version' : '8.0',
      'max_version' : '8.3.5.30351',
      'fixed_version' : '8.3.6'
      }];
    
    vcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_WARNING);
    
  • NASL familyWindows
    NASL idFOXIT_READER_9_1_0_5096.NASL
    descriptionThe version of Foxit Reader installed on the remote Windows host is prior to 9.1. It is, therefore, affected by multiple vulnerabilities.
    last seen2020-04-30
    modified2018-04-27
    plugin id109399
    published2018-04-27
    reporterThis script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/109399
    titleFoxit Reader < 9.1 Multiple Vulnerabilities
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(109399);
      script_version("1.6");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/04/27");
    
      script_cve_id(
        "CVE-2017-14458",
        "CVE-2017-17557",
        "CVE-2018-3842",
        "CVE-2018-3850",
        "CVE-2018-3853"
      );
      script_bugtraq_id(103942);
      script_xref(name:"ZDI", value:"ZDI-18-312");
      script_xref(name:"ZDI", value:"ZDI-18-313");
      script_xref(name:"ZDI", value:"ZDI-18-315");
      script_xref(name:"ZDI", value:"ZDI-18-329");
      script_xref(name:"ZDI", value:"ZDI-18-330");
      script_xref(name:"ZDI", value:"ZDI-18-331");
      script_xref(name:"ZDI", value:"ZDI-18-332");
      script_xref(name:"ZDI", value:"ZDI-18-335");
      script_xref(name:"ZDI", value:"ZDI-18-339");
      script_xref(name:"ZDI", value:"ZDI-18-340");
      script_xref(name:"ZDI", value:"ZDI-18-341");
      script_xref(name:"ZDI", value:"ZDI-18-342");
      script_xref(name:"ZDI", value:"ZDI-18-344");
      script_xref(name:"ZDI", value:"ZDI-18-345");
      script_xref(name:"ZDI", value:"ZDI-18-346");
      script_xref(name:"ZDI", value:"ZDI-18-348");
      script_xref(name:"ZDI", value:"ZDI-18-349");
      script_xref(name:"ZDI", value:"ZDI-18-350");
      script_xref(name:"ZDI", value:"ZDI-18-351");
      script_xref(name:"ZDI", value:"ZDI-18-352");
      script_xref(name:"ZDI", value:"ZDI-18-354");
      script_xref(name:"ZDI", value:"ZDI-18-358");
      script_xref(name:"ZDI", value:"ZDI-18-359");
    
      script_name(english:"Foxit Reader < 9.1 Multiple Vulnerabilities");
      script_summary(english:"Checks the version of Foxit Reader.");
    
      script_set_attribute(attribute:"synopsis", value:
    "A PDF viewer installed on the remote Windows host is affected by
    multiple vulnerabilities.");
      script_set_attribute(attribute:"description", value:
    "The version of Foxit Reader installed on the remote Windows host is
    prior to 9.1. It is, therefore, affected by multiple vulnerabilities.");
      script_set_attribute(attribute:"see_also", value:"https://www.foxitsoftware.com/support/security-bulletins.php");
      script_set_attribute(attribute:"solution", value:
    "Upgrade to Foxit Reader version 9.1 or later.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
      script_set_attribute(attribute:"cvss_score_source", value:"CVE-2017-14458");
    
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2018/04/19");
      script_set_attribute(attribute:"patch_publication_date", value:"2018/04/19");
      script_set_attribute(attribute:"plugin_publication_date", value:"2018/04/27");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:foxitsoftware:foxit_reader");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Windows");
    
      script_copyright(english:"This script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
    
      script_dependencies("foxit_reader_installed.nasl");
      script_require_keys("installed_sw/Foxit Reader");
    
      exit(0);
    }
    
    include('vcf.inc');
    
    app = 'Foxit Reader';
    
    app_info = vcf::get_app_info(app:app, win_local:TRUE);
    
    constraints = [{
      'min_version' : '9.0',
      'fixed_version' : '9.1.0.5096'
      }];
    
    vcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_WARNING);
    
  • NASL familyWindows
    NASL idFOXIT_PHANTOM_9_1_0_5096.NASL
    descriptionAccording to its version, the Foxit PhantomPDF application (formally known as Phantom) installed on the remote Windows host is prior to 9.1. It is, therefore, affected by multiple vulnerabilities.
    last seen2020-06-01
    modified2020-06-02
    plugin id109398
    published2018-04-27
    reporterThis script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/109398
    titleFoxit PhantomPDF < 9.1 Multiple Vulnerabilities
  • NASL familyWindows
    NASL idFOXIT_PHANTOM_9_1_0.NASL
    descriptionAccording to its version, the Foxit PhantomPDF application (formally known as Phantom) installed on the remote Windows host is prior to 9.1. It is, therefore, affected by multiple vulnerabilities.
    last seen2020-04-30
    modified2018-12-21
    plugin id119838
    published2018-12-21
    reporterThis script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/119838
    titleFoxit PhantomPDF < 9.1 Multiple Vulnerabilities

Seebug

bulletinFamilyexploit
description### Summary An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software Foxit PDF Reader version 9.0.1.1049. A specially crafted PDF document can trigger a previously freed object in memory to be reused resulting in arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. If the browser plugin extension is enabled, visiting a malicious site can also trigger the vulnerability. ### Tested Versions Foxit PDF Reader 9.0.1.1049. ### Product URLs https://www.foxitsoftware.com/products/pdf-reader/ ### CVSSv3 Score 8.8 - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H ### CWE CWE-416: Use After Free ### Details Foxit PDF Reader is one of the most popular PDF document readers and has a widespread user base. It aims to have feature parity with Adobe’s Acrobat Reader. As a complete and feature rich PDF reader it supports JavaScript for interactive documents and dynamic forms. JavaScript support posses an additional attack surface. Additionally, Foxit PDF Reader supports XFA or XML Forms Architecture which is a new way of making interactive PDF forms. Closing the currently active PDF document via JavaScript closeDoc call results in a clean-up of a lot of object. A stale reference to an already freed object can result in a use-after-free condition. If a document tries to create a template, but fails, an object is allocated and freed, but a stale reference to it is kept. When closing the document, this reference is reused, which can lead to memory corruption. This particular vulnerability lies in combinations of createTemplate and closeDoc methods which trigger a use after free: app.alert("alloc and free follow"); this.createTemplate("temp"); app.alert("uaf follows"); this.closeDoc(1); Opening the proof of concept PDF document in Foxit Reader with PageHeap enabled results in the following crash (note that Foxit Reader will pop up a warning that the file is damaged, due to malformed XFA objects, which is of no consequence to triggering the vulnerability): ``` First chance exceptions are reported before any exception handling. This exception may be expected and handled. eax=10fcdfd0 ebx=0feecee8 ecx=10fcdfd0 edx=0000000a esi=134fafd0 edi=00000000 eip=02393106 esp=001bdbb4 ebp=001bdbdc iopl=0 nv up ei pl nz na po nc cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00210202 FoxitReader!CertFreeCertificateChain+0x8b6d26: 02393106 83790800 cmp dword ptr [ecx+8],0 ds:0023:10fcdfd8=???????? 0:000> !heap -p -a ecx address 10fcdfd0 found in _DPH_HEAP_ROOT @ 7331000 in free-ed allocation ( DPH_HEAP_BLOCK: VirtAddr VirtSize) 11b81bfc: 10fcd000 2000 69db90b2 verifier!AVrfDebugPageHeapFree+0x000000c2 777569d4 ntdll!RtlDebugFreeHeap+0x0000002f 77719e5b ntdll!RtlpFreeHeap+0x0000005d 776e6416 ntdll!RtlFreeHeap+0x00000142 75b9c5f4 kernel32!HeapFree+0x00000014 02e7b1fb FoxitReader!CertFreeCertificateChain+0x0139ee1b 02583ce5 FoxitReader!CertFreeCertificateChain+0x00aa7905 02583c84 FoxitReader!CertFreeCertificateChain+0x00aa78a4 02583f71 FoxitReader!CertFreeCertificateChain+0x00aa7b91 02394e68 FoxitReader!CertFreeCertificateChain+0x008b8a88 0237bf4c FoxitReader!CertFreeCertificateChain+0x0089fb6c 023898b7 FoxitReader!CertFreeCertificateChain+0x008ad4d7 01558c17 FoxitReader+0x00178c17 01558bab FoxitReader+0x00178bab 014aeada FoxitReader+0x000ceada 014b0ae8 FoxitReader+0x000d0ae8 015f79de FoxitReader+0x002179de 015f77ab FoxitReader+0x002177ab 0160698a FoxitReader+0x0022698a 015f13f7 FoxitReader+0x002113f7 015f1218 FoxitReader+0x00211218 02cd24f9 FoxitReader!CertFreeCertificateChain+0x011f6119 02cd63fc FoxitReader!CertFreeCertificateChain+0x011fa01c 02cd648b FoxitReader!CertFreeCertificateChain+0x011fa0ab 75a9c4b7 USER32!InternalCallWinProc+0x00000023 75a9c5b7 USER32!UserCallWinProcCheckWow+0x0000014b 75a94ede USER32!DispatchClientMessage+0x000000cf 75a94f4d USER32!__fnDWORD+0x00000024 776d6bae ntdll!KiUserCallbackDispatcher+0x0000002e 75a95552 USER32!SendMessageW+0x0000007c 015eee15 FoxitReader+0x0020ee15 02cd8172 FoxitReader!CertFreeCertificateChain+0x011fbd92 ``` Analyzing the heap state clearly shows that ecx points into a freed memory region. If we examine the life of the object more closely, by setting breakpoints before and after calls to createTemplate and closeDoc we can observe the following: ``` address 10fcdfd0 found in _DPH_HEAP_ROOT @ 7331000 in busy allocation ( DPH_HEAP_BLOCK: UserAddr UserSize - VirtAddr VirtSize) 11b81bfc: 10fcdfd0 30 - 10fcd000 2000 69db8e89 verifier!AVrfDebugPageHeapAllocate+0x00000229 77756206 ntdll!RtlDebugAllocateHeap+0x00000030 7771a127 ntdll!RtlpAllocateHeap+0x000000c4 776e5950 ntdll!RtlAllocateHeap+0x0000023a 02e7ee12 FoxitReader!CertFreeCertificateChain+0x013a2a32 02583ca5 FoxitReader!CertFreeCertificateChain+0x00aa78c5 02583ad1 FoxitReader!CertFreeCertificateChain+0x00aa76f1 02583f11 FoxitReader!CertFreeCertificateChain+0x00aa7b31 01b69aeb FoxitReader!CertFreeCertificateChain+0x0008d70b 01b6a529 FoxitReader!CertFreeCertificateChain+0x0008e149 017291c8 FoxitReader+0x003491c8 02b26e8e FoxitReader!CertFreeCertificateChain+0x0104aaae 02b1ec76 FoxitReader!CertFreeCertificateChain+0x01042896 02b21023 FoxitReader!CertFreeCertificateChain+0x01044c43 ``` Above shows the object was allocated before a call closeDoc and is being freed during this call. This limits the window of opportunity that a potential attacker has to manipulate the memory and change the contents of the freed heap chunk, but it is still possible that careful manipulation of the document layout could lead to greater control. At the time of the crash, pointer pointing to already freed memory is used as this pointer, if contents of this memory are under control, a vtable dereference could result in control flow hijacking and ultimately in arbitrary code execution. ### Timeline * 2018-03-05 - Vendor Disclosure * 2018-04-19 - Public Release
idSSV:97300
last seen2018-06-08
modified2018-05-17
published2018-05-17
reporterKnownsec
titleFoxit PDF Reader JavaScript createTemplate Remote Code Execution Vulnerability(CVE-2018-3853)

Talos

idTALOS-2018-0536
last seen2020-01-24
published2018-04-19
reporterTalos Intelligence
sourcehttp://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0536
titleFoxit PDF Reader JavaScript createTemplate Remote Code Execution Vulnerability