Foxit Reader before 3.2.1.0401 allows remote attackers to (1) execute arbitrary local programs via a certain "/Type /Action /S /Launch" sequence, and (2) execute arbitrary programs embedded in a PDF document via an unspecified "/Launch /Action" sequence, a related issue to CVE-2009-0836.
References
Link | Resource |
---|---|
http://blog.didierstevens.com/2010/03/29/escape-from-pdf/ | Exploit |
http://blog.didierstevens.com/2010/03/31/escape-from-foxit-reader/ | Exploit |
http://www.f-secure.com/weblog/archives/00001923.html | |
http://www.foxitsoftware.com/announcements/2010420408.html | Patch Vendor Advisory |
http://www.foxitsoftware.com/pdf/reader/security.htm#0401 | Patch Vendor Advisory |
http://www.kb.cert.org/vuls/id/570177 | Patch US Government Resource |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2010-04-05 15:30
Updated : 2024-02-04 17:54
NVD link : CVE-2010-1239
Mitre link : CVE-2010-1239
CVE.ORG link : CVE-2010-1239
JSON object : View
Products Affected
foxitsoftware
- foxit_reader
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')