First published: Mon Oct 31 2016(Updated: )
Foxit Reader for Mac 2.1.0.0804 and earlier and Foxit Reader for Linux 2.1.0.0805 and earlier suffered from a vulnerability where weak file permissions could be exploited by attackers to execute arbitrary code. After the installation, Foxit Reader's core files were world-writable by default, allowing an attacker to overwrite them with backdoor code, which when executed by privileged user would result in Privilege Escalation, Code Execution, or both.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Foxit Reader Mac | <=2.1.0.0804 | |
Foxitsoftware Reader | <=2.1.0.0805 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-8856 is considered a critical vulnerability due to its potential for arbitrary code execution.
To fix CVE-2016-8856, update Foxit Reader to version 2.1.0.0805 or later for Linux and 2.1.0.0805 or later for Mac.
CVE-2016-8856 affects Foxit Reader for Mac versions up to 2.1.0.0804 and Foxit Reader for Linux versions up to 2.1.0.0805.
CVE-2016-8856 is a file permission vulnerability that allows attackers to exploit weak permissions to execute arbitrary code.
Yes, CVE-2016-8856 has the potential to be exploited by attackers due to the weak file permissions set during installation.