Page 73 of 366 results (0.008 seconds)

CVSS: 9.3EPSS: 5%CPEs: 23EXPL: 0

Integer overflow in Foxit Reader before 4.3.1.0218 and Foxit Phantom before 2.3.3.1112 allows remote attackers to execute arbitrary code via crafted ICC chunks in a PDF file, which triggers a heap-based buffer overflow. Desbordamiento de enteros en Foxit Reader anterior a v4.3.1.0218 y Foxit Phantom anterior a v2.3.3.1112 permite a atacantes remotos ejecutar código arbitrario a través de fragmentos ICC manipulados en un fichero PDF, lo que provoca un desbordamiento de búfer basado en heap. • http://secunia.com/advisories/43329 http://secunia.com/advisories/43440 http://secunia.com/secunia_research/2011-14 http://www.foxitsoftware.com/pdf/reader/security_bulletins.php#memory http://www.securitytracker.com/id?1025129 http://www.vupen.com/english/advisories/2011/0508 • CWE-189: Numeric Errors •

CVSS: 9.3EPSS: 2%CPEs: 7EXPL: 3

Foxit Reader before 3.2.1.0401 allows remote attackers to (1) execute arbitrary local programs via a certain "/Type /Action /S /Launch" sequence, and (2) execute arbitrary programs embedded in a PDF document via an unspecified "/Launch /Action" sequence, a related issue to CVE-2009-0836. Foxit Reader anterior a v3.2.1.0401 permite a atacantes remotos (1) ejecutar programas locales de su elección a través de determinadas secuencias "/Type /Action /S /Launch" y (2) ejecutar programas de su elección embebidos en un documento PDF a través de secuencias "/Launch /Action" no especificadas. Relacionado con el CVE-2009-0836. • https://www.exploit-db.com/exploits/11987 http://blog.didierstevens.com/2010/03/29/escape-from-pdf http://blog.didierstevens.com/2010/03/31/escape-from-foxit-reader http://www.f-secure.com/weblog/archives/00001923.html http://www.foxitsoftware.com/announcements/2010420408.html http://www.foxitsoftware.com/pdf/reader/security.htm#0401 http://www.kb.cert.org/vuls/id/570177 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 9.3EPSS: 11%CPEs: 3EXPL: 0

The Foxit JPEG2000/JBIG2 Decoder add-on before 2.0.2009.616 for Foxit Reader 3.0 before Build 1817 does not properly handle a negative value for the stream offset in a JPEG2000 (aka JPX) stream, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a crafted PDF file that triggers an out-of-bounds read. El complemento Foxit JPEG2000/JBIG2 Decoder antes de v2.0.2009.616 para Foxit Reader 3.0 antes de Build1817 no gestiona correctamente un valor negativo para la posición del octeto del stream en un flujo JPEG2000 (alias JPX), lo que permite a atacantes remotos provocar una denegación de servicio (mediante corrupción memoria y bloqueo de la aplicación) o posiblemente ejecutar código arbitrario a través de un archivo PDF modificado que provoca una lectura fuera de límite. • http://secunia.com/advisories/35512 http://securitytracker.com/id?1022425 http://www.foxitsoftware.com/pdf/reader/security.htm#0602 http://www.kb.cert.org/vuls/id/251793 http://www.securityfocus.com/bid/35442 http://www.vupen.com/english/advisories/2009/1640 • CWE-189: Numeric Errors •

CVSS: 9.3EPSS: 9%CPEs: 2EXPL: 0

The Foxit JPEG2000/JBIG2 Decoder add-on before 2.0.2009.616 for Foxit Reader 3.0 before Build 1817 does not properly handle a fatal error during decoding of a JPEG2000 (aka JPX) header, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a crafted PDF file that triggers an invalid memory access. El complemento Foxit JPEG2000/JBIG2 Decoder antes de v2.0.2009.616 para Foxit Reader 3.0 antes de Build1817 no gestiona correctamente un error fatal durante la decodificación de una cabecera JPEG2000 (alias JPX), lo que permite a atacantes remotos provocar una denegación de servicio (corrupción de memoria y bloqueo de la aplicación) o posiblemente ejecutar código arbitrario a través de un archivo PDF modificado que provoca un acceso a memoria no válida. • http://secunia.com/advisories/35512 http://securitytracker.com/id?1022425 http://www.foxitsoftware.com/pdf/reader/security.htm#0602 http://www.kb.cert.org/vuls/id/251793 http://www.securityfocus.com/bid/35443 http://www.vupen.com/english/advisories/2009/1640 • CWE-399: Resource Management Errors •

CVSS: 9.3EPSS: 8%CPEs: 3EXPL: 0

Foxit Reader 2.3 before Build 3902 and 3.0 before Build 1506, including 3.0.2009.1301, does not properly handle a JBIG2 symbol dictionary segment with zero new symbols, which allows remote attackers to execute arbitrary code via a crafted PDF file that triggers a dereference of an uninitialized memory location. Foxit Reader v2.3 anterior a Build 3902 y v3.0 anterior a Build 1506, ademas de v3.0.2009.1301, no maneja adecuadamente un segmento del símbolo JBIG2 del diccionario sin nuevos símbolos, lo que permite atacantes remotos ejecutar código arbitrariamente a través de un fichero PDF manipulado que inicia una desreferencia y una localización de memoria no inicializada. • http://secunia.com/advisories/34036 http://secunia.com/secunia_research/2009-11 http://www.foxitsoftware.com/pdf/reader/security.htm#Processing http://www.securityfocus.com/archive/1/501590/100/0/threaded http://www.securityfocus.com/bid/34035 http://www.securitytracker.com/id?1021822 http://www.vupen.com/english/advisories/2009/0634 https://exchange.xforce.ibmcloud.com/vulnerabilities/49135 • CWE-94: Improper Control of Generation of Code ('Code Injection') •