HTTP: Foxit Reader JavaScript getPageNumWords Use After Free

This signature detects attempts to exploit a known vulnerability against Foxit Reader. This vulnerability is due to crafted arguments to getPageNumWords Method. An attacker can create & send malicious pdf to victim & obtain code execution when the pdf is processed by vulnerable application.

Extended Description

An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's Foxit PDF Reader version 9.1.0.5096. A specially crafted PDF document can trigger a previously freed object in memory to be reused, resulting in arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. If the browser plugin extension is enabled, visiting a malicious site can also trigger the vulnerability.

Short Name
HTTP:STC:FOXIT-GETPAGE-UAF
Severity
Major
Recommended
True
Recommended Action
Drop
Category
HTTP
Keywords
After CVE-2018-3964 Foxit Free JavaScript Reader Use getPageNumWords
Release Date
03/13/2019
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3415
False Positive
Unknown
CVSS Score

6.8

Found a potential security threat?