Für PDF-Betrachter Foxit Reader, eine Alternative zu dem weit verbreiteten Adobe Reader, ist ein Update für die Version 3.0 mit der Buildnummer 1506 erschienen und beseitigt drei Sicherheitslücken der Vorgängerversion.
Fixed in Foxit Reader 3.0 Build 1506
1. Fixed the issue of stack-based buffer overflow: Foxit PDF files include actions associated with different triggers. If an action (Open/Execute a file, Open a web link, etc.) is defined in the PDF files with an overly long filename argument and the trigger condition is satisfied, it will cause a stack-based buffer overflow. the page. 2. Fixed the issue of security authorization bypass: If an action (Open/Execute a file, Open a web link, etc.) is defined in the PDF files and the trigger condition is satisfied, Foxit Reader will do the action defined by the creator of the PDF file without popping up a dialog box to confirm. 3. Fixed the issue of JBIG2 Symbol Dictionary Processing: While decoding a JBIG2 symbol dictionary segment, an array of 32-bit elements is allocated having a size equal to the number of exported symbols, but left uninitialised if the number of new symbols is zero. The array is later accessed and values from uninitialised memory are used as pointers when reading memory and performing calls.
Diesen Artikel bookmarken oder senden an ...
