{"vuid":"VU#119747","idnumber":"119747","name":"Foxit Reader buffer overflow vulnerability","keywords":["Foxit","Reader","buffer overflow","util.printf() JavaScript function"],"overview":"Foxit Reader contains a buffer overflow vulnerability that may allow an attacker to execute arbitrary code.","clean_desc":"Foxit Reader is a PDF reader that is available on multiple operating systems. From the Secuia Research advisory Foxit Reader \"util.printf()\" Buffer Overflow: Secunia Research has discovered a vulnerability in Foxit Reader, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error when parsing format strings containing a floating point specifier in the \"util.printf()\" JavaScript function. This can be exploited to cause a stack-based buffer overflow via a specially crafted PDF file. To exploit this vulnerability an attacker would have to persuade a user to open a specially crafted PDF file. The malicious PDF could be hosted on a web page or sent via email.","impact":"A remote, unauthenticated attacker may be able to execute arbitrary code.","resolution":"Foxit Reader version 2.3 build 2912 was released to address this issue.","workarounds":"Do not open untrusted PDF files Do not open unfamiliar or unexpected PDF attachments. Users can convert PDF documents to text or HTML by using search engine features or other hosted PDF rendering services.","sysaffected":"","thanks":"This vulnerability was published by Dyon Balding from Secunia Research.","author":"This document was written by Ryan Giobbi.","public":["http://secunia.com/advisories/29941/","http://www.adobe.com/devnet/pdf/pdf_reference.html","http://www.google.com/help/features.html#pdf"],"cveids":["CVE-2008-1104"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2008-05-20T15:05:30Z","publicdate":"2008-05-20T00:00:00Z","datefirstpublished":"2008-05-27T19:45:37Z","dateupdated":"2008-05-27T19:55:47Z","revision":22,"vrda_d1_directreport":"0","vrda_d1_population":"2","vrda_d1_impact":"3","cam_widelyknown":"18","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"5","cam_impact":"10","cam_easeofexploitation":"10","cam_attackeraccessrequired":"10","cam_scorecurrent":"1.6875","cam_scorecurrentwidelyknown":"1.875","cam_scorecurrentwidelyknownexploited":"3.75","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":1.6875,"vulnote":null}