<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cool PDF Reader PDF Stream Handling Buffer Overflow Vulnerability - CVE-2012-4914 in Advanced Threat Prevention Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cool-pdf-reader-pdf-stream-handling-buffer-overflow/m-p/416461#M1201</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We've got the same issue. Please&amp;nbsp;&lt;SPAN class="VIiyi"&gt;&lt;SPAN class="JLqJ4b ChMk0b"&gt;&lt;SPAN&gt;keep us informed&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;With kind regards,&lt;BR /&gt;ppater&lt;/P&gt;</description>
    <pubDate>Thu, 01 Jul 2021 10:10:31 GMT</pubDate>
    <dc:creator>PatrickPater</dc:creator>
    <dc:date>2021-07-01T10:10:31Z</dc:date>
    <item>
      <title>Cool PDF Reader PDF Stream Handling Buffer Overflow Vulnerability - CVE-2012-4914</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cool-pdf-reader-pdf-stream-handling-buffer-overflow/m-p/416362#M1198</link>
      <description>&lt;P&gt;Today we are getting bombarded with reports of email issues. Digging into the reports we have a lot of users who aren't able to send PDF's and the culprit is that the attachments are getting flagged by PAN.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="evievarga_0-1625076925319.png" style="width: 539px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/34678iFC97E74A9E958EF1/image-dimensions/539x237/is-moderation-mode/true?v=v2" width="539" height="237" role="button" title="evievarga_0-1625076925319.png" alt="evievarga_0-1625076925319.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="evievarga_1-1625077009946.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/34679iEAEC70F300C54452/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="evievarga_1-1625077009946.png" alt="evievarga_1-1625077009946.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;The related CVE shows it was updated yesterday. I'm struggling to find much information about the CVE. I feel like given the volume of reports we are getting these are false positives but am not sure. Need to do more analysis on my end but am curious if other people are experiencing issues with this?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 30 Jun 2021 18:23:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cool-pdf-reader-pdf-stream-handling-buffer-overflow/m-p/416362#M1198</guid>
      <dc:creator>evievarga</dc:creator>
      <dc:date>2021-06-30T18:23:34Z</dc:date>
    </item>
    <item>
      <title>Re: Cool PDF Reader PDF Stream Handling Buffer Overflow Vulnerability - CVE-2012-4914</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cool-pdf-reader-pdf-stream-handling-buffer-overflow/m-p/416390#M1199</link>
      <description>&lt;P&gt;I opened a case and got an official reply back that yes these are false positive detections.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for contacting Palo Alto Networks Support. I understand that you believe that you have a potential False Positive case with one of our Vulnerability signatures.&lt;BR /&gt;&lt;BR /&gt;Our engineering team has determined that the signature in question has been exhibiting false positive behavior and they have decided to modify it. The signature will be modified in a future Apps and Threats content release. Since it has been determined that the signature is producing false positive results, you may elect to implement a threat exception. I will let you know once the content version reflecting the change is identified.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 30 Jun 2021 21:23:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cool-pdf-reader-pdf-stream-handling-buffer-overflow/m-p/416390#M1199</guid>
      <dc:creator>evievarga</dc:creator>
      <dc:date>2021-06-30T21:23:30Z</dc:date>
    </item>
    <item>
      <title>Re: Cool PDF Reader PDF Stream Handling Buffer Overflow Vulnerability - CVE-2012-4914</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cool-pdf-reader-pdf-stream-handling-buffer-overflow/m-p/416461#M1201</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We've got the same issue. Please&amp;nbsp;&lt;SPAN class="VIiyi"&gt;&lt;SPAN class="JLqJ4b ChMk0b"&gt;&lt;SPAN&gt;keep us informed&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;With kind regards,&lt;BR /&gt;ppater&lt;/P&gt;</description>
      <pubDate>Thu, 01 Jul 2021 10:10:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cool-pdf-reader-pdf-stream-handling-buffer-overflow/m-p/416461#M1201</guid>
      <dc:creator>PatrickPater</dc:creator>
      <dc:date>2021-07-01T10:10:31Z</dc:date>
    </item>
    <item>
      <title>Re: Cool PDF Reader PDF Stream Handling Buffer Overflow Vulnerability - CVE-2012-4914</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cool-pdf-reader-pdf-stream-handling-buffer-overflow/m-p/416669#M1202</link>
      <description>&lt;P&gt;The issue is resolved in latest Content 8424.&lt;/P&gt;</description>
      <pubDate>Thu, 01 Jul 2021 21:37:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cool-pdf-reader-pdf-stream-handling-buffer-overflow/m-p/416669#M1202</guid>
      <dc:creator>mivaldi</dc:creator>
      <dc:date>2021-07-01T21:37:02Z</dc:date>
    </item>
    <item>
      <title>Re: Cool PDF Reader PDF Stream Handling Buffer Overflow Vulnerability - CVE-2012-4914</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cool-pdf-reader-pdf-stream-handling-buffer-overflow/m-p/417409#M1208</link>
      <description>&lt;P&gt;Security updates available&amp;nbsp;in Foxit Reader&amp;nbsp;10.1.4 and Foxit PhantomPDF 10.1.4 Local attackers could&amp;nbsp;exploit&amp;nbsp;this&amp;nbsp;vulnerability&amp;nbsp;to create a symbolic link and to the logic error or improper&amp;nbsp;handling&amp;nbsp;of elements when working with certain&amp;nbsp;PDF&amp;nbsp;files.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.firstcallonline.net/" target="_self"&gt;FirstCallOnline&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 09 Jul 2021 05:59:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cool-pdf-reader-pdf-stream-handling-buffer-overflow/m-p/417409#M1208</guid>
      <dc:creator>Leake541</dc:creator>
      <dc:date>2021-07-09T05:59:28Z</dc:date>
    </item>
  </channel>
</rss>

