Foxit Reader 9.7.2 update fixes critical vulnerabilities
Security vulnerabilities have been fixed as well as stability issues.
David FischerThe potential security issues come from remote code execution, a vulnerability when using the DocuSign plugin. Fixed a brute force attack vulnerability and other issues. Versions 9.7.1 and earlier are affected. If you are using the Foxit Reader, you should install the update quickly.
Find more about the vulnerability details below:
-
The update addresses potential issues where the application could be exposed to Type Confusion or Arbitrary File Write Remote Code Execution vulnerability and crash. This occurs during the handling of app.opencPDFWebPage JavaScript due to the lack of proper validation of parameters in socket message (ZDI-CAN-9828/ZDI-CAN-9829/ZDI-CAN-9830/ZDI-CAN-9831/ZDI-CAN-9865/ZDI-CAN-9942/ZDI-CAN-9943/ZDI-CAN-9944/ZDI-CAN-9945/ZDI-CAN-9946)
-
The update addresses a potential issue where the application could be exposed to Information Disclosure vulnerability if users were using the DocuSign plugin. This occurs because the username and password are hardcoded in the DocuSign plugin during an HTTP request.
-
The update addresses a potential issue where the application could be exposed to Brute-force Attack vulnerability as the CAS service did not limit the times of user login failures.
-
The update addresses potential issues where the application could be exposed to Use-After-Free Remote Code Execution vulnerability and crash when processing certain XFA template or AcroForm due to the use of objects which had been freed (ZDI-CAN-10132/ZDI-CAN-10142/ZDI-CAN-10614/ZDI-CAN-10650).
-
The update addresses a potential issue where the application could be exposed to Use-After-Free Remote Code Execution vulnerability and crash when working with certain malicious PDF file. This occurs as the application continues to execute JavaScript to open a document without proper validation after the page is deleted or the document is closed.
-
The update addresses a potential issue where the application could be exposed to Signature Validation Bypass vulnerability and deliver incorrect validation result when validating certain PDF file that is modified maliciously or contains non-standard signatures.
Read more in the security bulletin.
Update your Foxit applications to the latest versions via the Help tab of Foxit Reader or Foxit PhantomPDF, click on Check for Updates and update to the latest version.
Foxit Reader on UpdateStar | Download
Foxit PhantomPDF on UpdateStar | Download
About Author
David Fischer
I am a technology writer for UpdateStar, covering software, security, and privacy as well as research and innovation in information security. I worked as an editor for German computer magazines for more than a decade before starting to be a team member at UpdateStar.