PDF-XChange Viewer < 2.5 Build 208 JPEG Processing Buffer Overflow

high Nessus Plugin ID 65549

Synopsis

The remote Windows host has an application that is affected by a buffer overflow vulnerability.

Description

A version of PDF-XChange Viewer prior to 2.5 Build 208 is installed on the remote host. As such, it contains a flaw in the JPEG stream parsing feature that is triggered when the Define Huffman Table header of a JPEG image is not properly validated when embedded in a PDF document. An attacker could exploit this issue by tricking a user into opening a malicious PDF document, resulting in denial of service or arbitrary code execution.

Solution

Upgrade to PDF-XChange Viewer 2.5 Build 208 or later.

See Also

https://www.tracker-software.com/company/news_press_events/view/123

Plugin Details

Severity: High

ID: 65549

File Name: pdf-xchange_2_5_208.nasl

Version: 1.3

Type: local

Agent: windows

Family: Windows

Published: 3/14/2013

Updated: 11/15/2018

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:tracker-software:pdf-xchange, cpe:/a:tracker-software:pdf-xchange:viewer

Required KB Items: SMB/Registry/Enumerated, SMB/Tracker_Software/PDF-XChange Viewer/Installed

Exploit Ease: No known exploits are available

Patch Publication Date: 1/19/2013

Vulnerability Publication Date: 1/21/2013

Reference Information

CVE: CVE-2013-0729

BID: 57491