Fortinet Discovers Foxit Reader and PhantomPDF JPXDecode Memory Corruption Vulnerability
Fortinet's FortiGuard Labs has discovered a memory corruption vulnerability in Foxit Reader and PhantomPDF.
Foxit Reader is a small, lightning fast, and feature rich PDF viewer which allows users to create, open, view, sign, and print any PDF file. Foxit Reader is built upon the industry's fastest and most accurate PDF rendering engine, providing users with the best PDF viewing and printing experience.
Foxit PhantomPDF is the industry's premiere PDF editor; making editing PDF files easier than ever before to deliver professional looking PDF documents in no time at all. Its PDF editing capabilities provide capabilities similar to that of word processing software. The PDF editor automatically identifies text boxes and allows users to paragraph edit within that text box.
The specific vulnerability exists due to a JPXDecode Out-of-Bounds Read/Write when processing specially crafted PDF files with malformed JPXDecode streams, which could cause information leak or remote code execution.
SolutionsFortiGuard Labs released the following FortiGate IPS signature which covers this specific vulnerability:
Released Aug 05, 2016
Users should apply the solution provided by Foxit.
This vulnerability was discovered by Kai Lu of Fortinet's FortiGuard Labs.