CVE-2010-1239

Foxit Reader before 3.2.1.0401 allows remote attackers to (1) execute arbitrary local programs via a certain "/Type /Action /S /Launch" sequence, and (2) execute arbitrary programs embedded in a PDF document via an unspecified "/Launch /Action" sequence, a related issue to CVE-2009-0836.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:foxitsoftware:foxit_reader:*:*:*:*:*:*:*:*
cpe:2.3:a:foxitsoftware:foxit_reader:2.3:*:*:*:*:*:*:*
cpe:2.3:a:foxitsoftware:foxit_reader:3.0:*:*:*:*:*:*:*
cpe:2.3:a:foxitsoftware:foxit_reader:3.1.0.0824:*:*:*:*:*:*:*
cpe:2.3:a:foxitsoftware:foxit_reader:3.1.1.0901:*:*:*:*:*:*:*
cpe:2.3:a:foxitsoftware:foxit_reader:3.1.1.0928:*:*:*:*:*:*:*
cpe:2.3:a:foxitsoftware:foxit_reader:3.1.3.1030:*:*:*:*:*:*:*

History

21 Nov 2024, 01:13

Type Values Removed Values Added
References () http://blog.didierstevens.com/2010/03/29/escape-from-pdf/ - Exploit () http://blog.didierstevens.com/2010/03/29/escape-from-pdf/ - Exploit
References () http://blog.didierstevens.com/2010/03/31/escape-from-foxit-reader/ - Exploit () http://blog.didierstevens.com/2010/03/31/escape-from-foxit-reader/ - Exploit
References () http://www.f-secure.com/weblog/archives/00001923.html - () http://www.f-secure.com/weblog/archives/00001923.html -
References () http://www.foxitsoftware.com/announcements/2010420408.html - Patch, Vendor Advisory () http://www.foxitsoftware.com/announcements/2010420408.html - Patch, Vendor Advisory
References () http://www.foxitsoftware.com/pdf/reader/security.htm#0401 - Patch, Vendor Advisory () http://www.foxitsoftware.com/pdf/reader/security.htm#0401 - Patch, Vendor Advisory
References () http://www.kb.cert.org/vuls/id/570177 - Patch, US Government Resource () http://www.kb.cert.org/vuls/id/570177 - Patch, US Government Resource

Information

Published : 2010-04-05 15:30

Updated : 2024-11-21 01:13


NVD link : CVE-2010-1239

Mitre link : CVE-2010-1239

CVE.ORG link : CVE-2010-1239


JSON object : View

Products Affected

foxitsoftware

  • foxit_reader
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')