Intrusion Prevention

Foxit.Reader.Digital.Signature.Handling.Memory.Corruption

Description

This indicates an attack attempt against a Memory Corruption vulnerability in Foxit Reader or PhantomPDF.
The vulnerability is due to improper validation of ByteRange field when verifying the digital signature. A remote attacker may be able to exploit this to execute arbitrary code within the context of the application.

Affected Products

Foxit Reader 7.1.3.320
Foxit PhantomPDF 7.1.3.320

Impact

System Compromise: Remote attackers could gain control of vulnerable system.

Recommended Actions

Apply the latest update from the vendor.
http://www.foxitsoftware.com/support/security_bulletins.php