Foxit Reader for Mac 2.1.0.0804 and previous versions and Foxit Reader for Linux 2.1.0.0805 and previous versions suffered from a vulnerability where weak file permissions could be exploited by malicious users to execute arbitrary code. After the installation, Foxit Reader's core files were world-writable by default, allowing an malicious user to overwrite them with backdoor code, which when executed by privileged user would result in Privilege Escalation, Code Execution, or both.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
foxitsoftware reader |