Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (Generic)  >   Foxit Reader Vendors:   Foxit Software
Foxit Reader Weak File Permissions Lets Local Users Gain Elevated Privileges
SecurityTracker Alert ID:  1037101
SecurityTracker URL:
CVE Reference:   CVE-2016-8856   (Links to External Site)
Date:  Oct 26 2016
Impact:   Execution of arbitrary code via local system, Modification of system information, User access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): and prior for Linux; and prior for macOS
Description:   A vulnerability was reported in Foxit Reader. A local user can obtain elevated privileges on the target system.

The software installs certain files with world-writable permissions. A local user can modify the files so that when the target user runs Foxit Reader, arbitrary code is executed on the target system with the privileges of the target user.

The '' and '' files in '/opt/' are affected on Linux-based systems.

The FoxitReader and updater on OS X (macOS) are affected.

The vendor was notified on September 18, 2016.

The original advisory is available at:

c0dist (Garage4Hackers) reported this vulnerability.

Impact:   A local user can obtain elevated privileges on the target system.
Solution:   The vendor has issued a fix (2.2; for Mac and Linux).

The vendor advisory is available at:

Vendor URL: (Links to External Site)
Cause:   Access control error
Underlying OS:  Linux (Any), UNIX (macOS/OS X)

Message History:   None.

 Source Message Contents

[Original Message Not Available for Viewing]

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, LLC