Vulnerabilities > CVE-2019-5145 - Use After Free vulnerability in Foxitsoftware Phantompdf
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
HIGH Integrity impact
HIGH Availability impact
HIGH Summary
An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit PDF Reader, version 9.7.0.29435. A specially crafted PDF document can trigger a previously freed object in memory to be reused, resulting in arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. If the browser plugin extension is enabled, visiting a malicious site can also trigger the vulnerability.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Nessus
NASL family Windows NASL id FOXIT_READER_9_7_1.NASL description According to its version, the Foxit Reader application (formally known as Phantom) installed on the remote Windows host is prior to 9.7.1. It is, therefore, affected by multiple vulnerabilities: - A use-after-free error exists related to handling watermarks, AcroForm objects, text fields, or JavaScript field objects that allows arbitrary code execution. (CVE-2019-5126, CVE-2019-5130, CVE-2019-5131, CVE-2019-5145, ZDI-CAN-9358, ZDI-CAN-9640, ZDI-CAN-9400, ZDI-CAN-9862) - An integer overflow or out-of-bounds read/write error exists related to handling JPEG/JPG2000 images or JP2 streams that allows memory contents disclosure. (ZDI-CAN-9102, ZDI-CAN-9606, ZDI-CAN-9407, ZDI-CAN-9413, ZDI-CAN-9414, ZDI-CAN-9415, ZDI-CAN-9406, ZDI-CAN-9416) - An out-of-bounds write error and a use-after-free error exist related to handling HTML to PDF conversion that allows arbitrary code execution. (ZDI-CAN-9591, ZDI-CAN-9560) - A use-after-free error exists related to handling documents that are missing dictionaries that allows unspecified impact. - A stack overflow error exists related to handling indirect object references that allows application crashes and other unspecified impact. last seen 2020-03-18 modified 2020-02-06 plugin id 133526 published 2020-02-06 reporter This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/133526 title Foxit Reader < 9.7.1 Multiple Vulnerabilities code # # (C) Tenable Network Security, Inc. # include('compat.inc'); if (description) { script_id(133526); script_version("1.2"); script_set_attribute(attribute:"plugin_modification_date", value:"2020/02/06"); script_cve_id( "CVE-2019-5126", "CVE-2019-5130", "CVE-2019-5131", "CVE-2019-5145" ); script_xref(name:"ZDI", value:"ZDI-CAN-9102"); script_xref(name:"ZDI", value:"ZDI-CAN-9358"); script_xref(name:"ZDI", value:"ZDI-CAN-9400"); script_xref(name:"ZDI", value:"ZDI-CAN-9406"); script_xref(name:"ZDI", value:"ZDI-CAN-9407"); script_xref(name:"ZDI", value:"ZDI-CAN-9413"); script_xref(name:"ZDI", value:"ZDI-CAN-9414"); script_xref(name:"ZDI", value:"ZDI-CAN-9415"); script_xref(name:"ZDI", value:"ZDI-CAN-9416"); script_xref(name:"ZDI", value:"ZDI-CAN-9560"); script_xref(name:"ZDI", value:"ZDI-CAN-9591"); script_xref(name:"ZDI", value:"ZDI-CAN-9606"); script_xref(name:"ZDI", value:"ZDI-CAN-9640"); script_xref(name:"ZDI", value:"ZDI-CAN-9862"); script_xref(name:"IAVA", value:"2020-A-0049"); script_name(english:"Foxit Reader < 9.7.1 Multiple Vulnerabilities"); script_summary(english:"Checks the version of Foxit Reader."); script_set_attribute(attribute:"synopsis", value: "A PDF toolkit installed on the remote Windows host is affected by multiple vulnerabilities."); script_set_attribute(attribute:"description", value: "According to its version, the Foxit Reader application (formally known as Phantom) installed on the remote Windows host is prior to 9.7.1. It is, therefore, affected by multiple vulnerabilities: - A use-after-free error exists related to handling watermarks, AcroForm objects, text fields, or JavaScript field objects that allows arbitrary code execution. (CVE-2019-5126, CVE-2019-5130, CVE-2019-5131, CVE-2019-5145, ZDI-CAN-9358, ZDI-CAN-9640, ZDI-CAN-9400, ZDI-CAN-9862) - An integer overflow or out-of-bounds read/write error exists related to handling JPEG/JPG2000 images or JP2 streams that allows memory contents disclosure. (ZDI-CAN-9102, ZDI-CAN-9606, ZDI-CAN-9407, ZDI-CAN-9413, ZDI-CAN-9414, ZDI-CAN-9415, ZDI-CAN-9406, ZDI-CAN-9416) - An out-of-bounds write error and a use-after-free error exist related to handling HTML to PDF conversion that allows arbitrary code execution. (ZDI-CAN-9591, ZDI-CAN-9560) - A use-after-free error exists related to handling documents that are missing dictionaries that allows unspecified impact. - A stack overflow error exists related to handling indirect object references that allows application crashes and other unspecified impact."); script_set_attribute(attribute:"see_also", value:"https://www.foxitsoftware.com/support/security-bulletins.php"); script_set_attribute(attribute:"see_also", value:"https://www.zerodayinitiative.com/advisories/ZDI-CAN-9102/"); script_set_attribute(attribute:"see_also", value:"https://www.zerodayinitiative.com/advisories/ZDI-CAN-9358/"); script_set_attribute(attribute:"see_also", value:"https://www.zerodayinitiative.com/advisories/ZDI-CAN-9400/"); script_set_attribute(attribute:"see_also", value:"https://www.zerodayinitiative.com/advisories/ZDI-CAN-9406/"); script_set_attribute(attribute:"see_also", value:"https://www.zerodayinitiative.com/advisories/ZDI-CAN-9407/"); script_set_attribute(attribute:"see_also", value:"https://www.zerodayinitiative.com/advisories/ZDI-CAN-9413/"); script_set_attribute(attribute:"see_also", value:"https://www.zerodayinitiative.com/advisories/ZDI-CAN-9414/"); script_set_attribute(attribute:"see_also", value:"https://www.zerodayinitiative.com/advisories/ZDI-CAN-9415/"); script_set_attribute(attribute:"see_also", value:"https://www.zerodayinitiative.com/advisories/ZDI-CAN-9416/"); script_set_attribute(attribute:"see_also", value:"https://www.zerodayinitiative.com/advisories/ZDI-CAN-9560/"); script_set_attribute(attribute:"see_also", value:"https://www.zerodayinitiative.com/advisories/ZDI-CAN-9591/"); script_set_attribute(attribute:"see_also", value:"https://www.zerodayinitiative.com/advisories/ZDI-CAN-9606/"); script_set_attribute(attribute:"see_also", value:"https://www.zerodayinitiative.com/advisories/ZDI-CAN-9640/"); script_set_attribute(attribute:"see_also", value:"https://www.zerodayinitiative.com/advisories/ZDI-CAN-9862/"); script_set_attribute(attribute:"solution", value: "Upgrade to Foxit Reader version 9.7.1 or later."); script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"); script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C"); script_set_attribute(attribute:"cvss_score_source", value:"CVE-2019-5130"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"vuln_publication_date", value:"2020/01/16"); script_set_attribute(attribute:"patch_publication_date", value:"2020/01/16"); script_set_attribute(attribute:"plugin_publication_date", value:"2020/02/06"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"cpe:/a:foxitsoftware:foxit_reader"); script_set_attribute(attribute:"stig_severity", value:"II"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_family(english:"Windows"); script_copyright(english:"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof."); script_dependencies("foxit_reader_installed.nasl"); script_require_keys("installed_sw/Foxit Reader"); exit(0); } include('vcf.inc'); app = 'Foxit Reader'; app_info = vcf::get_app_info(app:app, win_local:TRUE); constraints = [ { 'max_version' : '9.7.0.29478', 'fixed_version' : '9.7.1'} ]; vcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_WARNING);
NASL family Windows NASL id FOXIT_PHANTOM_9_7_1.NASL description According to its version, the Foxit PhantomPDF application (formally known as Phantom) installed on the remote Windows host is prior to 9.7.1. It is, therefore, affected by multiple vulnerabilities: - A use-after-free error exists related to handling watermarks, AcroForm objects, text fields, or JavaScript field objects that allows arbitrary code execution. (CVE-2019-5126, CVE-2019-5130, CVE-2019-5131, CVE-2019-5145, ZDI-CAN-9358, ZDI-CAN-9640, ZDI-CAN-9400, ZDI-CAN-9862) - An integer overflow or out-of-bounds read/write error exists related to handling JPEG/JPG2000 images or JP2 streams that allows memory contents disclosure. (ZDI-CAN-9102, ZDI-CAN-9606, ZDI-CAN-9407, ZDI-CAN-9413, ZDI-CAN-9414, ZDI-CAN-9415, ZDI-CAN-9406, ZDI-CAN-9416) - An out-of-bounds write error and a use-after-free error exist related to handling HTML to PDF conversion that allows arbitrary code execution. (ZDI-CAN-9591, ZDI-CAN-9560) - A use-after-free error exists related to handling documents that are missing dictionaries that allows unspecified impact. - A stack overflow error exists related to handling indirect object references that allows application crashes and other unspecified impact. last seen 2020-03-18 modified 2020-02-06 plugin id 133525 published 2020-02-06 reporter This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/133525 title Foxit PhantomPDF < 9.7.1 Multiple Vulnerabilities code # # (C) Tenable Network Security, Inc. # include('compat.inc'); if (description) { script_id(133525); script_version("1.2"); script_set_attribute(attribute:"plugin_modification_date", value:"2020/02/06"); script_cve_id( "CVE-2019-5126", "CVE-2019-5130", "CVE-2019-5131", "CVE-2019-5145" ); script_xref(name:"ZDI", value:"ZDI-CAN-9102"); script_xref(name:"ZDI", value:"ZDI-CAN-9358"); script_xref(name:"ZDI", value:"ZDI-CAN-9400"); script_xref(name:"ZDI", value:"ZDI-CAN-9406"); script_xref(name:"ZDI", value:"ZDI-CAN-9407"); script_xref(name:"ZDI", value:"ZDI-CAN-9413"); script_xref(name:"ZDI", value:"ZDI-CAN-9414"); script_xref(name:"ZDI", value:"ZDI-CAN-9415"); script_xref(name:"ZDI", value:"ZDI-CAN-9416"); script_xref(name:"ZDI", value:"ZDI-CAN-9560"); script_xref(name:"ZDI", value:"ZDI-CAN-9591"); script_xref(name:"ZDI", value:"ZDI-CAN-9606"); script_xref(name:"ZDI", value:"ZDI-CAN-9640"); script_xref(name:"ZDI", value:"ZDI-CAN-9862"); script_xref(name:"IAVA", value:"2020-A-0049"); script_name(english:"Foxit PhantomPDF < 9.7.1 Multiple Vulnerabilities"); script_summary(english:"Checks the version of Foxit PhantomPDF."); script_set_attribute(attribute:"synopsis", value: "A PDF toolkit installed on the remote Windows host is affected by multiple vulnerabilities."); script_set_attribute(attribute:"description", value: "According to its version, the Foxit PhantomPDF application (formally known as Phantom) installed on the remote Windows host is prior to 9.7.1. It is, therefore, affected by multiple vulnerabilities: - A use-after-free error exists related to handling watermarks, AcroForm objects, text fields, or JavaScript field objects that allows arbitrary code execution. (CVE-2019-5126, CVE-2019-5130, CVE-2019-5131, CVE-2019-5145, ZDI-CAN-9358, ZDI-CAN-9640, ZDI-CAN-9400, ZDI-CAN-9862) - An integer overflow or out-of-bounds read/write error exists related to handling JPEG/JPG2000 images or JP2 streams that allows memory contents disclosure. (ZDI-CAN-9102, ZDI-CAN-9606, ZDI-CAN-9407, ZDI-CAN-9413, ZDI-CAN-9414, ZDI-CAN-9415, ZDI-CAN-9406, ZDI-CAN-9416) - An out-of-bounds write error and a use-after-free error exist related to handling HTML to PDF conversion that allows arbitrary code execution. (ZDI-CAN-9591, ZDI-CAN-9560) - A use-after-free error exists related to handling documents that are missing dictionaries that allows unspecified impact. - A stack overflow error exists related to handling indirect object references that allows application crashes and other unspecified impact."); script_set_attribute(attribute:"see_also", value:"https://www.foxitsoftware.com/support/security-bulletins.php"); script_set_attribute(attribute:"see_also", value:"https://www.zerodayinitiative.com/advisories/ZDI-CAN-9102/"); script_set_attribute(attribute:"see_also", value:"https://www.zerodayinitiative.com/advisories/ZDI-CAN-9358/"); script_set_attribute(attribute:"see_also", value:"https://www.zerodayinitiative.com/advisories/ZDI-CAN-9400/"); script_set_attribute(attribute:"see_also", value:"https://www.zerodayinitiative.com/advisories/ZDI-CAN-9406/"); script_set_attribute(attribute:"see_also", value:"https://www.zerodayinitiative.com/advisories/ZDI-CAN-9407/"); script_set_attribute(attribute:"see_also", value:"https://www.zerodayinitiative.com/advisories/ZDI-CAN-9413/"); script_set_attribute(attribute:"see_also", value:"https://www.zerodayinitiative.com/advisories/ZDI-CAN-9414/"); script_set_attribute(attribute:"see_also", value:"https://www.zerodayinitiative.com/advisories/ZDI-CAN-9415/"); script_set_attribute(attribute:"see_also", value:"https://www.zerodayinitiative.com/advisories/ZDI-CAN-9416/"); script_set_attribute(attribute:"see_also", value:"https://www.zerodayinitiative.com/advisories/ZDI-CAN-9560/"); script_set_attribute(attribute:"see_also", value:"https://www.zerodayinitiative.com/advisories/ZDI-CAN-9591/"); script_set_attribute(attribute:"see_also", value:"https://www.zerodayinitiative.com/advisories/ZDI-CAN-9606/"); script_set_attribute(attribute:"see_also", value:"https://www.zerodayinitiative.com/advisories/ZDI-CAN-9640/"); script_set_attribute(attribute:"see_also", value:"https://www.zerodayinitiative.com/advisories/ZDI-CAN-9862/"); script_set_attribute(attribute:"solution", value: "Upgrade to Foxit PhantomPDF version 9.7.1 or later."); script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"); script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C"); script_set_attribute(attribute:"cvss_score_source", value:"CVE-2019-5130"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"vuln_publication_date", value:"2020/01/16"); script_set_attribute(attribute:"patch_publication_date", value:"2020/01/16"); script_set_attribute(attribute:"plugin_publication_date", value:"2020/02/06"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"cpe:/a:foxitsoftware:phantom"); script_set_attribute(attribute:"cpe", value:"cpe:/a:foxitsoftware:phantompdf"); script_set_attribute(attribute:"stig_severity", value:"II"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_family(english:"Windows"); script_copyright(english:"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof."); script_dependencies("foxit_phantom_installed.nasl"); script_require_keys("installed_sw/FoxitPhantomPDF"); exit(0); } include('vcf.inc'); app = 'FoxitPhantomPDF'; app_info = vcf::get_app_info(app:app, win_local:TRUE); constraints = [ { 'max_version' : '9.7.0.29455', 'fixed_version' : '9.7.1' } ]; vcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_WARNING);
Talos
id | TALOS-2019-0934 |
last seen | 2020-01-25 |
published | 2020-01-16 |
reporter | Talos Intelligence |
source | http://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0934 |
title | Foxit PDF Reader JavaScript field keystroke action remote code execution vulnerability |