Foxit patches critical vulnerability in the PDF-reader for browsers

Posted: January 18, 2013 in IT Security News, Security Notices
Tags: , ,

Foxit ReaderInformation on the vulnerability has been publicly available for one week.

Foxit released version 5.4.5 of its Foxit Reader PDF viewer plug-in on Thursday in order to address a critical remote code execution vulnerability. In the new version (5.4.5) developers eliminated the critical gap allowing the potential malefactor far off to execute any code on target system.

It should be noted that all ActiveX versions of a component of the program for Mozilla Firefox, Google Chrome, Opera and Safari browsers were vulnerable. In the notice also it is noted that the independent researcher of safety of Andrea Micalizzi was succeeded to find vulnerability.

Let’s remind that the expert publicly opened detailed information on the vulnerability and methods of its operation on the web site on January 7 the current year.

Foxit Software is positioning its product as a safer alternative to Adobe Reader application and advertises as “the most secure PDF Reader”. According to the company, to date, the number of users of the browser add-on has more than 130 million people.

The detailed description of vulnerability here.


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s