Check Point Reference: | CPAI-2017-0784 |
Date Published: | 24 Sep 2017 |
Severity: | Medium |
Last Updated: | Thursday 24 October, 2019 |
Source: | |
Industry Reference: | CVE-2017-10953 CVE-2019-8160 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | Foxit Software Foxit Reader 8.3.1.21155 and earlier Foxit Software PhantomPDF 8.3.1.21155 and earlier |
Vulnerability Description | A command injection vulnerability exists in the XFA component of Foxit Reader and PhantomPDF. This vulnerability is due to improper handling of user-supplied string for the gotoURL function call. A remote attacker could exploit this vulnerability by enticing a victim user to visit a malicious web page or open a crafted PDF document. |
This protection detects attempts to exploit this vulnerability.
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: Content Protection Violation.
Attack Information: Foxit Reader and PhantonPDF XFA gotoURL Command Injection