Memory corruption in Foxit PDF Editor (formerly Foxit PhantomPDF) - #VU6411

 

Memory corruption in Foxit PDF Editor (formerly Foxit PhantomPDF) - #VU6411

Published: May 4, 2017


Vulnerability identifier: #VU6411
CSH Severity: High
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: N/A
CWE-ID: CWE-119
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: Foxit Software Inc.
Affected software:
Foxit PDF Editor (formerly Foxit PhantomPDF)

Detailed vulnerability description

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error when converting JPEG or TIFF files to PDFs. A remote attacker can create a specially crafted JPEG or TIFF file, trick the victim to convert it into PDF, trigger memory corruption and out-of-bounds read and gain access to potentially sensitive information or execute arbitrary code on the target system with privileges of the current user.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.


Remediation

Update to version 7.3.13.

Sources