CVE-2015-2789 : Detail

CVE-2015-2789

0.07%V3
Local
2015-03-30
12h00 +00:00
2016-12-01
15h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Unquoted Windows search path vulnerability in the Foxit Cloud Safe Update Service in the Cloud plugin in Foxit Reader 6.1 through 7.0.6.1126 allows local users to gain privileges via a Trojan horse program in the %SYSTEMDRIVE% folder.

CVE Informations

Metrics

Metrics Score Severity CVSS Vector Source
V2 4.4 AV:L/AC:M/Au:N/C:P/I:P/A:P [email protected]

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 36390

Publication date : 2015-03-15 23h00 +00:00
Author : LiquidWorm
EDB Verified : No

 Foxit Reader 7.0.6.1126 Unquoted Service Path Elevation Of Privilege Vendor: Foxit Software Incorporated Product web page: http://www.foxitsoftware.com Affected version: 7.0.6.1126 and 6.1 Summary: Foxit Reader is a small, lightning fast, and feature rich PDF viewer which allows you to create (free PDF creation), open, view, sign, and print any PDF file. Desc: The application suffers from an unquoted search path issue impacting the service 'FoxitCloudUpdateService' for Windows deployed as part of Foxit Reader. This could potentially allow an authorized but non-privileged local user to execute arbitrary code with elevated privileges on the system. A successful attempt would require the local user to be able to insert their code in the system root path undetected by the OS or other security applications where it could potentially be executed during application startup or reboot. If successful, the local user’s code would execute with the elevated privileges of the application. Tested on: Microsoft Windows 7 Ultimate SP1 (EN) Vulnerability discovered by Aljaz Ceru [email protected] Advisory ID: ZSL-2015-5235 Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5235.php Vendor: http://www.foxitsoftware.com/support/security_bulletins.php#FRD-25 17.02.2015 -- C:\Users\user>sc qc FoxitCloudUpdateService [SC] QueryServiceConfig SUCCESS SERVICE_NAME: FoxitCloudUpdateService TYPE : 110 WIN32_OWN_PROCESS (interactive) START_TYPE : 2 AUTO_START ERROR_CONTROL : 1 NORMAL BINARY_PATH_NAME : C:\Program Files\Foxit Software\Foxit Reader\Foxit Cloud\FCUpdateService.exe LOAD_ORDER_GROUP : TAG : 0 DISPLAY_NAME : Foxit Cloud Safe Update Service DEPENDENCIES : SERVICE_START_NAME : LocalSystem C:\Users\user>

Products Mentioned

Configuraton 0

Foxitsoftware>>Foxit_reader >> Version 6.1

Foxitsoftware>>Foxit_reader >> Version 6.1.2

Foxitsoftware>>Foxit_reader >> Version 6.1.4

Foxitsoftware>>Foxit_reader >> Version 6.2

Foxitsoftware>>Foxit_reader >> Version 6.2.1

Foxitsoftware>>Foxit_reader >> Version 7.0

Foxitsoftware>>Foxit_reader >> Version 7.0.6

References

http://www.securityfocus.com/bid/73432
Tags : vdb-entry, x_refsource_BID
http://www.securitytracker.com/id/1031879
Tags : vdb-entry, x_refsource_SECTRACK
http://www.exploit-db.com/exploits/36390
Tags : exploit, x_refsource_EXPLOIT-DB