Risk | Low |
Patch available | YES |
Number of vulnerabilities | 4 |
CVE-ID | N/A |
CWE-ID | CWE-476 CWE-125 CWE-119 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software Subscribe |
Foxit Reader for Mac Client/Desktop applications / Office applications Foxit PDF Editor for Mac (formerly PhantomPDF) Client/Desktop applications / Office applications |
Vendor | Foxit Software Inc. |
Security Bulletin
This security bulletin contains information about 4 vulnerabilities.
EUVDB-ID: #VU68899
Risk: Low
CVSSv3.1:
CVE-ID: N/A
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error when handling certain JavaScripts. A remote attacker can pass specially crafted data to the application and perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's website.
Vulnerable software versionsFoxit Reader for Mac: 11.0.0.0510 - 12.0.1.0720
Foxit PDF Editor for Mac (formerly PhantomPDF): 12.0.0.0601 - 12.0.1.0720
CPE2.3 External linksQ & A
Can this vulnerability be exploited remotely?
How the attacker can exploit this vulnerability?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU68900
Risk: Low
CVSSv3.1:
CVE-ID: N/A
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error when parsing certain PDF files whose colSpan attribute is set beyond the maximum length allowed. A remote attacker can pass specially crafted data to the application and perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's website.
Vulnerable software versionsFoxit Reader for Mac: 11.0.0.0510 - 12.0.1.0720
Foxit PDF Editor for Mac (formerly PhantomPDF): 12.0.0.0601 - 12.0.1.0720
CPE2.3 External linksQ & A
Can this vulnerability be exploited remotely?
How the attacker can exploit this vulnerability?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU68901
Risk: Low
CVSSv3.1:
CVE-ID: N/A
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to crash the application.
The vulnerability exists due to a boundary condition when parsing U3D files. A remote attacker can create a specially crafted U3D file, trick the victim into opening it, trigger an out-of-bounds read error and crash the application.
Install updates from vendor's website.
Vulnerable software versionsFoxit PDF Editor for Mac (formerly PhantomPDF): 11.0.1.0719 - 12.0.1.0720
Foxit Reader for Mac: 12.0.0.0601 - 12.0.1.0720
CPE2.3 External linksQ & A
Can this vulnerability be exploited remotely?
How the attacker can exploit this vulnerability?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU68902
Risk: Low
CVSSv3.1:
CVE-ID: N/A
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to crash the application.
The vulnerability exists due to a boundary condition when handling certain PDF files containing a field that is formatted as “Percent” with an overly large value, or due to the infinite recursion resulting from the incorrect hierarchy structure of nodes when handling certain PDF or XFA files.. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger a buffer overflow and crash the application.
Install updates from vendor's website.
Vulnerable software versionsFoxit PDF Editor for Mac (formerly PhantomPDF): 11.0.1.0719 - 12.0.1.0720
Foxit Reader for Mac: 12.0.0.0601 - 12.0.1.0720
CPE2.3 External linksQ & A
Can this vulnerability be exploited remotely?
How the attacker can exploit this vulnerability?
Is there known malware, which exploits this vulnerability?