Fortinet Discovers Foxit PDF Toolkit Memory Corruption Vulnerability
Fortinet's FortiGuard Labs has discovered a memory corruption vulnerability in Foxit PDF Toolkit.
Foxit PDF Toolkit consists of a suite of modules which can help better handle tasks associated with large batches of pdf documents, such as:
. Adding text-based or image-based watermarks to documents
. Converting Microsoft Office documents to PDF
. Adding headers and footers to PDF files
. Optimizing pdf documents
. Protecting documents with Rights Management Services
. Converting image files to PDF
A memory corruption vulnerability has been discovered in Foxit PDF Toolkit. The vulnerability can be triggered by a specifically crafted PDF file which causes an out of bounds memory access, due to improper bounds checking. Attackers could exploit the vulnerability by using the out of bounds access to execute arbitrary code within the context of the application.
SolutionsFortiGuard Labs released the following FortiGate IPS signature which covers this specific vulnerability:
Released Oct 16, 2016
Users should apply the solution provided by Foxit Software.
Fortinet reported the vulnerability to Foxit Software on Oct. 13, 2016.
Foxit Software confirmed the vulnerability on Oct. 16, 2016.
Foxit Software patched the vulnerability on Jan. 10, 2017.
This vulnerability was discovered by Kushal Arvind Shah of Fortinet's FortiGuard Labs.