Foxit Reader Plugin For Browsers URL Processing Buffer Overflow Vulnerability
Severity: CRITICAL
Advisory Date: JUL 21, 2015
DESCRIPTION
The vulnerability is caused due to a boundary error in the Foxit Reader plugin for browsers (npFoxitReaderPlugin.dll) when processing a URL and can be exploited to cause a stack-based buffer overflow via e.g. an overly long file name in the URL.
Successful exploitation allows execution of arbitrary code.
TREND MICRO PROTECTION INFORMATION
Apply associated Trend Micro DPI Rules.
SOLUTION
Trend Micro Deep Security DPI Rule Number: 1005329