Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2018-3853: TALOS-2018-0536 || Cisco Talos Intelligence Group

An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software Foxit PDF Reader version 9.0.1.1049. A specially crafted PDF document can trigger a previously freed object in memory to be reused resulting in arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. If the browser plugin extension is enabled, visiting a malicious site can also trigger the vulnerability.

CVE
#vulnerability#cisco#java#intel#pdf

Summary

An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software Foxit PDF Reader version 9.0.1.1049. A specially crafted PDF document can trigger a previously freed object in memory to be reused resulting in arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. If the browser plugin extension is enabled, visiting a malicious site can also trigger the vulnerability.

Tested Versions

Foxit PDF Reader 9.0.1.1049.

Product URLs

https://www.foxitsoftware.com/products/pdf-reader/

CVSSv3 Score

8.8 - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CWE

CWE-416: Use After Free

Details

Foxit PDF Reader is one of the most popular PDF document readers and has a widespread user base. It aims to have feature parity with Adobe’s Acrobat Reader. As a complete and feature rich PDF reader it supports JavaScript for interactive documents and dynamic forms. JavaScript support posses an additional attack surface. Additionally, Foxit PDF Reader supports XFA or XML Forms Architecture which is a new way of making interactive PDF forms.

Closing the currently active PDF document via JavaScript closeDoc call results in a clean-up of a lot of object. A stale reference to an already freed object can result in a use-after-free condition. If a document tries to create a template, but fails, an object is allocated and freed, but a stale reference to it is kept. When closing the document, this reference is reused, which can lead to memory corruption.

This particular vulnerability lies in combinations of createTemplate and closeDoc methods which trigger a use after free:

app.alert(“alloc and free follow”); this.createTemplate(“temp”); app.alert(“uaf follows”); this.closeDoc(1);

Opening the proof of concept PDF document in Foxit Reader with PageHeap enabled results in the following crash (note that Foxit Reader will pop up a warning that the file is damaged, due to malformed XFA objects, which is of no consequence to triggering the vulnerability):

First chance exceptions are reported before any exception handling.
This exception may be expected and handled.
eax=10fcdfd0 ebx=0feecee8 ecx=10fcdfd0 edx=0000000a esi=134fafd0 edi=00000000
eip=02393106 esp=001bdbb4 ebp=001bdbdc iopl=0         nv up ei pl nz na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00210202
FoxitReader!CertFreeCertificateChain+0x8b6d26:
02393106 83790800        cmp     dword ptr [ecx+8],0  ds:0023:10fcdfd8=????????
0:000> !heap -p -a ecx
    address 10fcdfd0 found in
    _DPH_HEAP_ROOT @ 7331000
    in free-ed allocation (  DPH_HEAP_BLOCK:         VirtAddr         VirtSize)
                                   11b81bfc:         10fcd000             2000
    69db90b2 verifier!AVrfDebugPageHeapFree+0x000000c2
    777569d4 ntdll!RtlDebugFreeHeap+0x0000002f
    77719e5b ntdll!RtlpFreeHeap+0x0000005d
    776e6416 ntdll!RtlFreeHeap+0x00000142
    75b9c5f4 kernel32!HeapFree+0x00000014
    02e7b1fb FoxitReader!CertFreeCertificateChain+0x0139ee1b
    02583ce5 FoxitReader!CertFreeCertificateChain+0x00aa7905
    02583c84 FoxitReader!CertFreeCertificateChain+0x00aa78a4
    02583f71 FoxitReader!CertFreeCertificateChain+0x00aa7b91
    02394e68 FoxitReader!CertFreeCertificateChain+0x008b8a88
    0237bf4c FoxitReader!CertFreeCertificateChain+0x0089fb6c
    023898b7 FoxitReader!CertFreeCertificateChain+0x008ad4d7
    01558c17 FoxitReader+0x00178c17
    01558bab FoxitReader+0x00178bab
    014aeada FoxitReader+0x000ceada
    014b0ae8 FoxitReader+0x000d0ae8
    015f79de FoxitReader+0x002179de
    015f77ab FoxitReader+0x002177ab
    0160698a FoxitReader+0x0022698a
    015f13f7 FoxitReader+0x002113f7
    015f1218 FoxitReader+0x00211218
    02cd24f9 FoxitReader!CertFreeCertificateChain+0x011f6119
    02cd63fc FoxitReader!CertFreeCertificateChain+0x011fa01c
    02cd648b FoxitReader!CertFreeCertificateChain+0x011fa0ab
    75a9c4b7 USER32!InternalCallWinProc+0x00000023
    75a9c5b7 USER32!UserCallWinProcCheckWow+0x0000014b
    75a94ede USER32!DispatchClientMessage+0x000000cf
    75a94f4d USER32!__fnDWORD+0x00000024
    776d6bae ntdll!KiUserCallbackDispatcher+0x0000002e
    75a95552 USER32!SendMessageW+0x0000007c
    015eee15 FoxitReader+0x0020ee15
    02cd8172 FoxitReader!CertFreeCertificateChain+0x011fbd92

Analyzing the heap state clearly shows that ecx points into a freed memory region. If we examine the life of the object more closely, by setting breakpoints before and after calls to createTemplate and closeDoc we can observe the following:

address 10fcdfd0 found in
_DPH_HEAP_ROOT @ 7331000
in busy allocation (  DPH_HEAP_BLOCK:         UserAddr         UserSize -         VirtAddr         VirtSize)
                            11b81bfc:         10fcdfd0               30 -         10fcd000             2000
69db8e89 verifier!AVrfDebugPageHeapAllocate+0x00000229
77756206 ntdll!RtlDebugAllocateHeap+0x00000030
7771a127 ntdll!RtlpAllocateHeap+0x000000c4
776e5950 ntdll!RtlAllocateHeap+0x0000023a
02e7ee12 FoxitReader!CertFreeCertificateChain+0x013a2a32
02583ca5 FoxitReader!CertFreeCertificateChain+0x00aa78c5
02583ad1 FoxitReader!CertFreeCertificateChain+0x00aa76f1
02583f11 FoxitReader!CertFreeCertificateChain+0x00aa7b31
01b69aeb FoxitReader!CertFreeCertificateChain+0x0008d70b
01b6a529 FoxitReader!CertFreeCertificateChain+0x0008e149
017291c8 FoxitReader+0x003491c8
02b26e8e FoxitReader!CertFreeCertificateChain+0x0104aaae
02b1ec76 FoxitReader!CertFreeCertificateChain+0x01042896
02b21023 FoxitReader!CertFreeCertificateChain+0x01044c43

Above shows the object was allocated before a call closeDoc and is being freed during this call. This limits the window of opportunity that a potential attacker has to manipulate the memory and change the contents of the freed heap chunk, but it is still possible that careful manipulation of the document layout could lead to greater control.

At the time of the crash, pointer pointing to already freed memory is used as this pointer, if contents of this memory are under control, a vtable dereference could result in control flow hijacking and ultimately in arbitrary code execution.

Timeline

2018-03-05 - Vendor Disclosure
2018-04-19 - Public Release

Discovered by Aleksandar Nikolic of Cisco Talos.

Related news

CVE-2022-28104: Security Bulletins | Foxit Software

Foxit PDF Editor v11.3.1 was discovered to contain an arbitrary file upload vulnerability.

CVE-2022-30557: Security Bulletins | Foxit Software

Foxit PDF Reader and PDF Editor before 11.2.2 have a Type Confusion issue that causes a crash because of Unsigned32 mishandling during JavaScript execution.

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907