Fortinet Discovers Foxit Reader And PhantomPDF Digital Signature Handling Memory Corruption Vulnerability
Fortinet's FortiGuard Labs has discovered a memory corruption vulnerability in Foxit Reader and PhantomPDF.
Foxit Reader is a small, lightning fast, and feature rich PDF viewer which allows users to create, open, view, sign, and print any PDF file. Foxit Reader is built upon the industry's fastest and most accurate PDF rendering engine, providing users with the best PDF viewing and printing experience.
Foxit PhantomPDF is the industry's premiere PDF editor; making editing PDF files easier than ever before to deliver professional looking PDF documents in no time at all. Its PDF editing capabilities provide capabilities similar to that of word processing software. The PDF editor automatically identifies text boxes and allows users to paragraph edit within that text box.
The discovered vulnerability is caused due to insufficient validation when verifying the digital signature in Foxit Reader and PhantomPDF. Attackers could exploit this vulnerability to cause a denial of service (memory corruption) or potentially execute arbitrary code.
SolutionsFortiGuard Labs released the following FortiGate IPS signature which covers this specific vulnerability:
Released May 20, 2015
Users should apply the solution provided by Foxit Software.
The fields '/ByteRange' and 'adbe.pkcs7.detached' in PDF file are used for digital signature. A memory corruption issue is caused in Foxit Reader and PhantomPDF when they are changed to malformed values.
This vulnerability was discovered by Kai Lu of Fortinet's FortiGuard Labs.