Fortinet Discovers Foxit Reader and PhantomPDF Heap Overflow Vulnerability
Fortinet's FortiGuard Labs has discovered a heap overflow vulnerability in Foxit Reader and PhantomPDF.
Foxit Reader is a small, lightning fast, and feature rich PDF viewer which allows users to create, open, view, sign, and print any PDF file. Foxit Reader is built upon the industry's fastest and most accurate PDF rendering engine, providing users with the best PDF viewing and printing experience.
Foxit PhantomPDF is the industry's premiere PDF editor; making editing PDF files easier than ever before to deliver professional looking PDF documents in no time at all. Its PDF editing capabilities provide capabilities similar to that of word processing software. The PDF editor automatically identifies text boxes and allows users to paragraph edit within that text box.
The discovered vulnerability is caused due to insufficient validation of Bezier data when Foxit Reader and PhantomPDF parse a malformed PDF file. Attackers could exploit this vulnerability to cause a denial of service (memory corruption) or potentially execute arbitrary code.
SolutionsFortiGuard Labs released the following FortiGate IPS signature which covers this specific vulnerability:
Released Apr 18, 2016
Users should apply the solution provided by Foxit.
This vulnerability was discovered by Kai Lu of Fortinet's FortiGuard Labs.