Fortinet Discovers Foxit Reader and PhantomPDF XFA Forms Handling Memory Corruption Vulnerability
Fortinet's FortiGuard Labs has discovered a memory corruption vulnerability in Foxit Reader and PhantomPDF.
Foxit Reader is a small, lightning fast, and feature rich PDF viewer which allows users to create, open, view, sign, and print any PDF file. Foxit Reader is built upon the industry's fastest and most accurate PDF rendering engine, providing users with the best PDF viewing and printing experience.
Foxit PhantomPDF is the industry's premiere PDF editor; making editing PDF files easier than ever before to deliver professional looking PDF documents in no time at all. Its PDF editing capabilities provide capabilities similar to that of word processing software. The PDF editor automatically identifies text boxes and allows users to paragraph edit within that text box.
The discovered vulnerability is caused due to insufficient validation when parsing certain XFA forms in Foxit Reader and PhantomPDF. Attackers could exploit this vulnerability to cause a denial of service (memory corruption) or potentially execute arbitrary code.
SolutionsFortiGuard Labs released the following FortiGate IPS signature which covers this specific vulnerability:
Released May 27, 2015
Users should apply the solution provided by Foxit Software.
The issue can be triggered when an object id is changed to a malformed value.
This vulnerability was discovered by Kai Lu of Fortinet's FortiGuard Labs.