Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Foxit PDF Vulnerability Patched – Mozilla Moves to Render PDFs Internally

A recently disclosed vulnerability in the Foxit PDF viewer has been patched in the latest software release. The issue, first discovered by Italian security researcher Andrea Micalizzi, centered on a code execution flaw that could have been exploited remotely.

A recently disclosed vulnerability in the Foxit PDF viewer has been patched in the latest software release. The issue, first discovered by Italian security researcher Andrea Micalizzi, centered on a code execution flaw that could have been exploited remotely.

According to Micalizzi, the flaw would allow an attacker to write to the memory location of their choosing. As mentioned previously, the vulnerability wasn’t found within Foxit’s software, but the DLL file that creates the link between Foxit and Firefox (npFoxitReaderPlugin.dll).

Foxit released an updated version of the vulnerable DLL file on the eleventh, but a fully patched download was released on Thursday.

The software firm is encouraging everyone to update. Foxit is a popular alternative to Adobe’s PDF Reader, and the application often recommended as a more secure alternative. However, the continuous attacks on PDF-centric add-on software has led Mozilla to discuss plans to include a PDF reader as part of the core functions of their Firefox browser. “For a number of years there have been several plugins for viewing PDF’s within Firefox. Many of these plugins come with proprietary closed source code that could potentially expose users to security vulnerabilities,” a blog post from Mozilla, giving a slight poke to Adobe, explained.

In addition to the risk potential, PDF reading add-ons also mean more code. In order to address both problems, developers within Mozilla Labs have created a reader within Firefox using HTML 5. The feature was announced on last Friday, and is available in the beta release of the browser.

Google’s Chrome browser has a similar offering, but it is developed using Foxit’s SDK, which is layered with protections from Chrome’s sandbox. Mozilla’s announcement and subsequent code advancement, while taking steps to protect end users, opens the door to attacks via Firefox’s JavaScript rendering.

Still, Mozilla is moving forward and the consensus is that the move is a good one. Time will tell if it proves to be more secure.

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Kim Larsen is new Chief Information Security Officer at Keepit

Professional services company Slalom has appointed Christopher Burger as its first CISO.

Allied Universal announced that Deanna Steele has joined the company as CIO for North America.

More People On The Move

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Vulnerabilities

A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Vulnerabilities

Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.

IoT Security

A vulnerability affecting Dahua cameras and video recorders can be exploited by threat actors to modify a device’s system time.