I'll have PDF with another slice of PDF please.

Published: 2013-01-11
Last Updated: 2013-01-11 14:44:08 UTC
by Stephen Hall (Version: 1)
3 comment(s)

Well, hot on the heals of Microsoft Patch Tuesday as we now know comes Adobe Patch Tuesday. 

Guy has already kindly alerted us to the Cold Fusion vulnerability announced in apsa13-01 but we also need to highlight apsa13-02 which was also released on the 8th.

This covers a huge number of CVE's (27 if you need to know) and most of which "could" lead to code execution using a variety of techniques including use-after-free, integer, heap and stack over flows.

However, as we know "other PDF readers are available" and Foxit is quiet often what security minded people have installed. However there is also announced this week an as yet un-patched vulnerability discovered by Andrea Micalizzii in Foxit Reader 5.x, and Foxit Reader 2.x Plugin for which the exploit code is publicly available. This has reportedly been tested against version Foxit Reader which is what is available for download as of today.


3 comment(s)


- https://secunia.com/advisories/51733/
Release Date: 2013-01-08
Criticality level: Highly critical
Impact: System access
Where: From remote
Solution Status: Unpatched
... vulnerability is confirmed in version (npFoxitReaderPlugin.dll version Other versions may also be affected...

Does enabling the safe reading setting under trust manager within Fox-it Reader mitigate this latest vulnerability?
Foxit has always been vulnerable. I've never viewed it as a viable substitute for the Adobe Reader.

Diary Archives