First published: Tue Sep 27 2011(Updated: )
Untrusted search path vulnerability in Foxit Reader before 5.0.2.0718 allows local users to gain privileges via a Trojan horse dwmapi.dll, dwrite.dll, or msdrm.dll in the current working directory.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Foxit Reader | <=5.0 | |
Foxit Reader | =2.0 | |
Foxit Reader | =2.2 | |
Foxit Reader | =2.3 | |
Foxit Reader | =3.0 | |
Foxit Reader | =3.1 | |
Foxit Reader | =3.1.1 | |
Foxit Reader | =3.1.3 | |
Foxit Reader | =3.1.4 | |
Foxit Reader | =3.2 | |
Foxit Reader | =3.2.1 | |
Foxit Reader | =3.3.1 | |
Foxit Reader | =4.0 | |
Foxit Reader | =4.1.1 | |
Foxit Reader | =4.2 | |
Foxit Reader | =4.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-3691 is classified as a local privilege escalation vulnerability.
To fix CVE-2011-3691, upgrade to Foxit Reader version 5.0.2.0718 or later.
CVE-2011-3691 can be exploited using Trojan horse files such as dwmapi.dll, dwrite.dll, or msdrm.dll placed in the working directory.
If you are using Foxit Reader versions prior to 5.0.2.0718, then you are affected by CVE-2011-3691.
Local users on systems running vulnerable versions of Foxit Reader are at risk from CVE-2011-3691.