CVE-2015-2790 : Detail

CVE-2015-2790

A03-Injection
78.09%V3
Network
2015-03-30
12h00 +00:00
2016-12-01
15h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Foxit Reader, Enterprise Reader, and PhantomPDF before 7.1 allow remote attackers to cause a denial of service (memory corruption and crash) via a crafted (1) Ubyte Size in a DataSubBlock structure or (2) LZWMinimumCodeSize in a GIF image.

CVE Informations

Related Weaknesses

CWE-ID Weakness Name Source
CWE-20 Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.

Metrics

Metrics Score Severity CVSS Vector Source
V2 4.3 AV:N/AC:M/Au:N/C:N/I:N/A:P [email protected]

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 36335

Publication date : 2015-03-10 23h00 +00:00
Author : Francis Provencher
EDB Verified : No

##################################################################################### Application: Foxit Products GIF Conversion Memory Corruption Vulnerabilities (DataSubBlock) Platforms: Windows Versions: The vulnerability is confirmed in version Foxit Reader 7.x. Other versions may also be affected. Secunia: SA63346 {PRL}: 2015-02 Author: Francis Provencher (Protek Research Lab’s) Website: http://www.protekresearchlab.com/ Twitter: @ProtekResearch ##################################################################################### 1) Introduction 2) Report Timeline 3) Technical details 4) POC ##################################################################################### =============== 1) Introduction =============== Foxit Reader is a multilingual freemium PDF tool that can create, view, edit, digitally sign, and print PDF files.[3] Early versions of Foxit Reader were notable for startup performance and small file size.[citation needed] Foxit has been compared favorably toAdobe Reader.[4][5][6] The Windows version allows annotating and saving unfinished PDF forms, FDF import/export, converting to text, highlighting and drawing. (http://en.wikipedia.org/wiki/Foxit_Reader) ##################################################################################### ============================ 2) Report Timeline ============================ 2015-01-22: Francis Provencher from Protek Research Lab’s found the issue; 2015-01-28: Foxit Security Response Team confirmed the issue; 2015-01-28: Foxit fixed the issue; 2015-03-09: Foxit released fixed version of Foxit Reader 7.1/Foxit Enterprise Reader 7.1/Foxit PhantomPDF7.1. ##################################################################################### ============================ 3) Technical details ============================ An error when handling the Size member of a GIF DataSubBlock data structure can be exploited to cause memory corruption via a specially crafted GIF file. ##################################################################################### =========== 4) POC =========== http://protekresearchlab.com/exploits/PRL-2015-02.gif https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/36335.gif ###############################################################################
Exploit Database EDB-ID : 36334

Publication date : 2015-03-10 23h00 +00:00
Author : Francis Provencher
EDB Verified : No

##################################################################################### Application: Foxit Products GIF Conversion Memory Corruption Vulnerabilities (LZWMinimumCodeSize) Platforms: Windows Versions: The vulnerability is confirmed in version Foxit Reader 7.x. Other versions may also be affected. Secunia: SA63346 {PRL}: 2015-01 Author: Francis Provencher (Protek Research Lab’s) Website: http://www.protekresearchlab.com/ Twitter: @ProtekResearch ##################################################################################### 1) Introduction 2) Report Timeline 3) Technical details 4) POC ##################################################################################### =============== 1) Introduction =============== Foxit Reader is a multilingual freemium PDF tool that can create, view, edit, digitally sign, and print PDF files.[3] Early versions of Foxit Reader were notable for startup performance and small file size.[citation needed] Foxit has been compared favorably toAdobe Reader.[4][5][6] The Windows version allows annotating and saving unfinished PDF forms, FDF import/export, converting to text, highlighting and drawing. (http://en.wikipedia.org/wiki/Foxit_Reader) ##################################################################################### ============================ 2) Report Timeline ============================ 2015-02-17: Francis Provencher from Protek Research Lab’s found the issue; 2015-02-21: Foxit Security Response Team confirmed the issue; 2015-02-21: Foxit fixed the issue; 2015-03-09: Foxit released fixed version of Foxit Reader 7.1/Foxit Enterprise Reader 7.1/Foxit PhantomPDF7.1. ##################################################################################### ============================ 3) Technical details ============================ An error when handling LZWMinimumCodeSize can be exploited to cause memory corruption via a specially crafted GIF file. ##################################################################################### =========== 4) POC =========== http://protekresearchlab.com/exploits/PRL-2015-01.gif https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/36334.gif ###############################################################################

Products Mentioned

Configuraton 0

Foxitsoftware>>Enterprise_reader >> Version To (including) 7.0.6.1126

Foxitsoftware>>Foxit_reader >> Version To (including) 7.0.6.1126

Foxitsoftware>>Phantompdf >> Version To (including) 7.0.6.1126

References

http://securitytracker.com/id/1031878
Tags : vdb-entry, x_refsource_SECTRACK
http://www.securityfocus.com/bid/73430
Tags : vdb-entry, x_refsource_BID
http://www.osvdb.org/119303
Tags : vdb-entry, x_refsource_OSVDB
http://www.securitytracker.com/id/1031877
Tags : vdb-entry, x_refsource_SECTRACK
http://www.osvdb.org/119302
Tags : vdb-entry, x_refsource_OSVDB
http://www.exploit-db.com/exploits/36334
Tags : exploit, x_refsource_EXPLOIT-DB
http://www.exploit-db.com/exploits/36335
Tags : exploit, x_refsource_EXPLOIT-DB