Foxit Enterprise Reader 8.0 has been released by Foxit Software. Foxit Enterprise Reader is a free PDF reader designed to meet the needs of an enterprise. It is designed to be fully compatible with Adobe Reader and provides full-fidelity viewing of PDF documents.
New Features in Foxit Reader 8.0
- ConnectedPDF-More than PDF
- Create a ConnectedPDF document
- Register a new version of a ConnectedPDF document
- Request a file
- Configure Permissions
- Join a connected review without any third-party server
- Control document data and settings on the Document Homepage
- Manage file access history and messages with the Personal Homepage
- Dropbox integration
- Supports Touch Mode when working on touch-screen devices.
- Convert .msg files (emails) to PDF using the right-click context menu in Windows Explorer.
- Add an option to automatically save PDF documents at regular intervals in case of system crash or power failure.
Improvements in Foxit Reader 8.0
- RMS security enhancements (Enterprise Packaging only).
- Preserve formatting when copying tables from PDFs.
- View custom metadata in PDF.
- Print PDF sections/pages directly from selected bookmark(s).
- Support for SharePoint 2016 version.
- Cut, delete and move multiple bookmarks at a time.
- Pin the most used SharePoint, OneDrive, Google Drive, and Dropbox folders to the File > Open/Save As panels in Foxit Reader for easy access.
Issues Addressed in Foxit Reader 8.0
- Fixed some security and stability issues
Vulnerability Details
- Fixed a security issue where the application could be exposed to a Use-After-Free Remote Code Execution vulnerability when opening a XFA file whose layout direction is set as “lr-tb”.
- Fixed a security issue where the application could be exposed to a FlatDecode Use-After-Free Remote Code Execution vulnerability when parsing the inline image in certain PDF file (CVE-2016-6168).
- Fixed a security issue where the application could be exposed to a Safe Mode Bypass Information Disclosure vulnerability when handling SWF content that is embedded in a PDF file, which could be leveraged by attackers to access user’s local files or remote resources.
- Fixed a security issue where the application could be exposed to an exportData Restrictions Bypass Remote Code Execution vulnerability, which could be leveraged by attackers to execute a malicious file.
- Fixed a security issue where the application could be exposed to a ConvertToPDF TIFF Parsing Out-of-Bounds Write Remote Code Execution vulnerability when converting certain TIFF file to PDF file.
- Fixed a security issue where the application could be exposed to a JPEG Parsing Out-of-Bounds Read Information Disclosure vulnerability when converting a JPEG file that contains incorrect EXIF data to PDF file.
- Fixed a security issue where the application could be exposed to a JPEG Parsing Out-of-Bounds Read Information Disclosure vulnerability when parsing a JPEG image with corrupted color component in a PDF file.
- Fixed a security issue where the application could be exposed to a ConvertToPDF GIF Parsing Out-of-Bounds Write Remote Code Execution vulnerability when converting certain GIF file to PDF file.
- Fixed a security issue where the application could be exposed to a ConvertToPDF BMP Parsing Out-of-Bounds Write Remote Code Execution vulnerability or a ConvertToPDF BMP Parsing Out-of-Bounds Read Information Disclosure vulnerability when converting a BMP file to PDF file.
- Fixed a security issue where the application could be exposed to an Out-of-Bounds Read vulnerability which could be leveraged by attackers to execute remote code under the context of the current process.
- Fixed a security issue where the application could be exposed to a Heap Buffer Overflow Remote Code Execution vulnerability when processing specially crafted TIFF files with large SamplesPerPixel values.
- Fixed a security issue where the application could be exposed to a Stack Buffer Overflow Remote Code Execution vulnerability when parsing an unusually long GoToR string.
- Fixed a security issue where the application could crash unexpectedly when parsing a PDF file that contains messy code in its image description.
- Fixed a security issue where the application could be exposed to a Pattern Uninitialized Pointer Remote Code Execution vulnerability when processing a stretched image in certain PDF files.
- Fixed a security issue where the application could be exposed to a Heap Overflow vulnerability when parsing the content of a PDF file containing incorrect Bezier data (CVE-2016-6169).
Foxit Enterprise Reader is one of the applications that is managed and updated by ODS. If you are a current customer who has requested Foxit Enterprise Reader, ODS will automatically update your version over the next few days. The update will install silently. No user interaction is required. There are no additional fees or charges for ODS to update your version of Foxit Enterprise Reader.
If you would like assistance managing and deploying Foxit Enterprise Reader for PCs, please contact H Tech Solutions using the URL below.