Fortinet Discovers Foxit Reader and PhantomPDF JPXDecode Heap Overflow Vulnerability
Fortinet's FortiGuard Labs has discovered a heap overflow vulnerability in Foxit Reader and PhantomPDF.
Foxit Reader is a small, lightning fast, and feature rich PDF viewer which allows users to create, open, view, sign, and print any PDF file. Foxit Reader is built upon the industry's fastest and most accurate PDF rendering engine, providing users with the best PDF viewing and printing experience.
Foxit PhantomPDF is the industry's premiere PDF editor; making editing PDF files easier than ever before to deliver professional looking PDF documents in no time at all. Its PDF editing capabilities provide capabilities similar to that of word processing software. The PDF editor automatically identifies text boxes and allows users to paragraph edit within that text box.
The specific vulnerability exists within JPXDecode PDF streams. It's a potential memory vulnerability when processing specially crafted PDF files with malformed JPXDecode streams, which could cause the application to crash unexpectedly.
SolutionsFortiGuard Labs released the following FortiGate IPS signature which covers this specific vulnerability:
Released Aug 05, 2016
Users should apply the solution provided by Foxit.
This vulnerability was discovered by Kai Lu of Fortinet's FortiGuard Labs.