Foxit Reader Plugin For Browsers URL Processing Buffer Overflow Vulnerability
Publish Date: 21 de июля de 2015
Severity: : Critical
Advisory Date: 21 de июля de 2015
DESCRIPTION
The vulnerability is caused due to a boundary error in the Foxit Reader plugin for browsers (npFoxitReaderPlugin.dll) when processing a URL and can be exploited to cause a stack-based buffer overflow via e.g. an overly long file name in the URL.
Successful exploitation allows execution of arbitrary code.
INFORMATION EXPOSURE
Apply associated Trend Micro DPI Rules.
SOLUTION
Trend Micro Deep Security DPI Rule Number: 1005329