CVE编号
CVE-2018-1178利用情况
暂无补丁情况
N/A披露时间
2018-05-18漏洞描述
Foxit Reader是一款小型的PDF文档查看器和打印程序。Foxit Reader在addField方法处理中存在安全漏洞,由于在对对象执行操作之前未进行验证,导致攻击者可利用漏洞在当前进程上下文中执行任意代码。
解决建议
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:https://www.foxitsoftware.com/support/security-bulletins.php
参考链接 |
|
---|---|
https://www.foxitsoftware.com/support/security-bulletins.php | |
https://zerodayinitiative.com/advisories/ZDI-18-316 |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | foxitsoftware | foxit_reader | * |
Up to (including) 9.0.1.1049 |
|||||
运行在以下环境 | |||||||||
应用 | foxitsoftware | phantompdf | * |
Up to (including) 9.0.1.1049 |
|||||
运行在以下环境 | |||||||||
系统 | alibaba_cloud_linux_2.1903 | tomcat | * |
Up to (excluding) 7.0.76-9.1.al7 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_3.10 | tomcat | * |
Up to (excluding) 1.12.2-r0 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_3.11 | tomcat | * |
Up to (excluding) 1.12.2-r0 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_3.12 | tomcat | * |
Up to (excluding) 1.12.2-r0 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_3.13 | tomcat | * |
Up to (excluding) 1.12.2-r0 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_3.7 | tomcat | * |
Up to (excluding) 1.9.12-r0 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_3.8 | tomcat | * |
Up to (excluding) 1.10.6-r0 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_3.9 | tomcat | * |
Up to (excluding) 1.12.2-r0 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_edge | tomcat | * |
Up to (excluding) 1.12.2-r0 |
|||||
运行在以下环境 | |||||||||
系统 | amazon_2 | tomcat | * |
Up to (excluding) 7.0.76-9.amzn2 |
|||||
运行在以下环境 | |||||||||
系统 | amazon_AMI | tomcat | * |
Up to (excluding) 7.0.91-1.34.amzn1 |
|||||
运行在以下环境 | |||||||||
系统 | centos_7 | tomcat | * |
Up to (excluding) 3.4.0-5.el7_7 |
|||||
运行在以下环境 | |||||||||
系统 | centos_8 | tomcat8 | * |
Up to (excluding) 3.0.26-3.module+el8.0.0+3248+9d514f3b |
|||||
运行在以下环境 | |||||||||
系统 | debian_10 | tomcat | * |
Up to (excluding) 1.10.4-1+deb10u1 |
|||||
运行在以下环境 | |||||||||
系统 | debian_8 | tomcat | * |
Up to (excluding) 7.0.56-3+deb8u3 |
|||||
运行在以下环境 | |||||||||
系统 | debian_9 | tomcat | * |
Up to (excluding) 3.4.2-1~deb9u1 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_27 | tomcat | * |
Up to (excluding) 3.4.2-2.fc27 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_28 | tomcat | * |
Up to (excluding) 3.4.2-2.fc28 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_29 | tomcat | * |
Up to (excluding) 3.4.2-2.fc29 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_30 | tomcat | * |
Up to (excluding) 1.12.2-1.fc30 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_EPEL_6 | tomcat | * |
Up to (excluding) 7.0.92-1.el6 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.0 | tomcat | * |
Up to (excluding) 3.4.2-lp150.6.3.1 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.1 | tomcat | * |
Up to (excluding) 1.10.6-lp151.4.3.1 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_42.3 | tomcat | * |
Up to (excluding) 8.0.53-18.1 |
|||||
运行在以下环境 | |||||||||
系统 | oracle_7 | tomcat | * |
Up to (excluding) 3.4.0-4.el7_5 |
|||||
运行在以下环境 | |||||||||
系统 | oracle_8 | tomcat | * |
Up to (excluding) 3.18.1-8.module+el8.0.0+5231+3e842911 |
|||||
运行在以下环境 | |||||||||
系统 | redhat_8 | tomcat8 | * |
Up to (excluding) 3.0.26-3.module+el8.0.0+3248+9d514f3b |
|||||
运行在以下环境 | |||||||||
系统 | suse_11_SP4 | tomcat | * |
Up to (excluding) 6.0.53-0.57.10.1 |
|||||
运行在以下环境 | |||||||||
系统 | suse_12_SP3 | tomcat | * |
Up to (excluding) 8.0.53-29.16.2 |
|||||
运行在以下环境 | |||||||||
系统 | suse_12_SP4 | tomcat | * |
Up to (excluding) 3.4.2-44.3.1 |
|||||
- 攻击路径 网络
- 攻击复杂度 低
- 权限要求 无
- 影响范围 未更改
- 用户交互 需要
- 可用性 高
- 保密性 高
- 完整性 高
还没有评论,来说两句吧...