Vulnerability Description
Stack-based buffer overflow in Foxit Reader before 2.3 build 2912 allows user-assisted remote attackers to execute arbitrary code via a crafted PDF file, related to the util.printf JavaScript function and floating point specifiers in format strings.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Foxitsoftware | Foxit Reader | <= 2.3 |
Related Weaknesses (CWE)
References
- http://secunia.com/advisories/29941
- http://secunia.com/secunia_research/2008-18/advisory/
- http://securityreason.com/securityalert/3899Third Party Advisory
- http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=800801Broken Link
- http://www.kb.cert.org/vuls/id/119747Third Party AdvisoryUS Government Resource
- http://www.securityfocus.com/archive/1/492289/100/0/threaded
- http://www.securityfocus.com/bid/29288Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id?1020050Third Party AdvisoryVDB Entry
- http://www.vupen.com/english/advisories/2008/1572Permissions Required
- https://exchange.xforce.ibmcloud.com/vulnerabilities/42531
- http://secunia.com/advisories/29941
- http://secunia.com/secunia_research/2008-18/advisory/
- http://securityreason.com/securityalert/3899Third Party Advisory
- http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=800801Broken Link
- http://www.kb.cert.org/vuls/id/119747Third Party AdvisoryUS Government Resource
FAQ
What is CVE-2008-1104?
CVE-2008-1104 is a vulnerability with a CVSS score of 9.3 (HIGH). Stack-based buffer overflow in Foxit Reader before 2.3 build 2912 allows user-assisted remote attackers to execute arbitrary code via a crafted PDF file, related to the util.printf JavaScript function...
How severe is CVE-2008-1104?
CVE-2008-1104 has been rated HIGH with a CVSS base score of 9.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2008-1104?
Check the references section above for vendor advisories and patch information. Affected products include: Foxitsoftware Foxit Reader.