Foxit Reader Open File Buffer Overflow Exploit Update

This module exploits a buffer overflow vulnerability in Foxit Reader. If an Open/Execute a file action is defined in the PDF file with an overly long file name argument, when the trigger condition is satisfied it will cause a stack-based buffer overflow, because the application tries to copy the file name argument to a fixed-size buffer in the stack without properly checking that the buffer is large enough to hold the file name string. This update adds support for Windows Vista and Windows Server 2003.
Exploit type: 
Vulnerabilty ID: 
Product Version: 
Released Date: 
Tuesday, April 7, 2009 - 00:00