Foxit Reader before 3.2.1.0401 allows remote attackers to (1) execute arbitrary local programs via a certain "/Type /Action /S /Launch" sequence, and (2) execute arbitrary programs embedded in a PDF document via an unspecified "/Launch /Action" sequence, a related issue to CVE-2009-0836.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
http://www.f-secure.com/weblog/archives/00001923.html | |
http://www.kb.cert.org/vuls/id/570177 | us government resource third party advisory patch |
http://blog.didierstevens.com/2010/03/29/escape-from-pdf/ | exploit |
http://blog.didierstevens.com/2010/03/31/escape-from-foxit-reader/ | exploit |
http://www.foxitsoftware.com/pdf/reader/security.htm#0401 | patch vendor advisory |
http://www.foxitsoftware.com/announcements/2010420408.html | patch vendor advisory |