CVE-2018-9975 – Foxit Reader shift event Use-After-Free Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2018-9975
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of shift events. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code under the context of the current process. • https://www.foxitsoftware.com/support/security-bulletins.php https://zerodayinitiative.com/advisories/ZDI-18-359 • CWE-416: Use After Free •
CVE-2017-10952 – Foxit Reader saveAs Arbitrary File Write Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2017-10952
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.2.0.2051. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the saveAs JavaScript function. The issue results from the lack of proper validation of user-supplied data, which can lead to writing arbitrary files into attacker controlled locations. An attacker can leverage this vulnerability to execute code under the context of the current process. • https://github.com/afbase/CVE-2017-10952 http://www.securityfocus.com/bid/100412 http://www.securitytracker.com/id/1039212 https://0patch.blogspot.com/2017/08/0patching-foxit-readers-saveas-0day-cve.html https://zerodayinitiative.com/advisories/ZDI-17-692 • CWE-20: Improper Input Validation CWE-693: Protection Mechanism Failure •
CVE-2017-10994
https://notcve.org/view.php?id=CVE-2017-10994
Foxit Reader before 8.3.1 and PhantomPDF before 8.3.1 have an Arbitrary Write vulnerability, which allows remote attackers to execute arbitrary code via a crafted document. Foxit Reader anterior a versión 8.3.1 y PhantomPDF anterior a versión 8.3.1, presenta una vulnerabilidad de Escritura Arbitraria, que permite a los atacantes remotos ejecutar código arbitrario por medio de un documento creado. • http://www.securityfocus.com/bid/99499 http://www.securitytracker.com/id/1039113 https://www.foxitsoftware.com/support/security-bulletins.php • CWE-123: Write-what-where Condition •
CVE-2017-8454
https://notcve.org/view.php?id=CVE-2017-8454
Foxit Reader before 8.2.1 and PhantomPDF before 8.2.1 have an out-of-bounds read that allows remote attackers to obtain sensitive information or possibly execute arbitrary code via a crafted font in a PDF document. Foxit Reader en versiones anteriores a la 8.2.1 y PhantomPDF en versiones anteriores a la 8.2.1, presentan una vulnerabilidad de lectura fuera de límites que permite a atacantes remotos obtener información sensible o ejecutar código arbitrario a través de una fuente manipulada en un documento PDF. • http://www.securityfocus.com/bid/98320 http://www.zerodayinitiative.com/advisories/ZDI-17-135 https://www.foxitsoftware.com/support/security-bulletins.php • CWE-125: Out-of-bounds Read •
CVE-2017-8455
https://notcve.org/view.php?id=CVE-2017-8455
Foxit Reader before 8.2.1 and PhantomPDF before 8.2.1 have an out-of-bounds read that allows remote attackers to obtain sensitive information or possibly execute arbitrary code via a crafted font in a PDF document. Foxit Reader anterior a 8.2.1 y PhantomPDF anterior a 8.2.1 están afectados por una lectura fuera de límites que permite a un atacante remoto obtener información sensible o ejecutar código de forma arbitraria utilizando una fuente manipulada en un documento PDF. • http://www.securityfocus.com/bid/98319 http://www.zerodayinitiative.com/advisories/ZDI-17-140 https://www.foxitsoftware.com/support/security-bulletins.php • CWE-125: Out-of-bounds Read •