JMH
Emeritus, Contributor
- Apr 2, 2012
- 7,197
Foxit released version 5.4.5 of its Foxit Reader PDF viewer plug-in on Thursday in order to address a critical remote code execution vulnerability that could have allowed attackers to compromise computers running previous versions of the software.
The vulnerability was located in the Foxit Reader browser plug-in for Mozilla Firefox, Google Chrome, Opera, and Safari and could have been exploited by tricking users into opening an URL to a PDF document with an extremely long file name. The plug-in -- npFoxitReaderPlugin.dll -- is installed by default unless users clear a checkbox during the Foxit Reader installation process.
Foxit patches critical vulnerability in PDF viewer browser plug-in | Security - InfoWorld