Foxit Reader Plugin For Browsers URL Processing Buffer Overflow Vulnerability

  Severity: CRITICAL
  Advisory Date: JUL 21, 2015

  DESCRIPTION

The vulnerability is caused due to a boundary error in the Foxit Reader plugin for browsers (npFoxitReaderPlugin.dll) when processing a URL and can be exploited to cause a stack-based buffer overflow via e.g. an overly long file name in the URL. Successful exploitation allows execution of arbitrary code.

  TREND MICRO PROTECTION INFORMATION

Apply associated Trend Micro DPI Rules.

  SOLUTION

  Trend Micro Deep Security DPI Rule Number: 1005329

Featured Stories