Beschreibung
Multiple serious vulnerabilities have been found in multiple Foxit products. Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code or obtain sensitive information.
Below is a complete list of vulnerabilities
- Use-after-free vulnerability can be exploited remotely via a specially designed XFA or PDF file to execute arbitrary code;
- An unknown vulnerability can be exploited remotely via a specially designed PDF content to obtain sensitive information;
- An unknown vulnerability can be exploited remotely to execute arbitrary file;
- Out-of-bounds vulnerability at ConvertToPDF module can be exploited remotely via a specially designed TIFF, JPEG, GIF or BMP file to execute arbitrary code;
- Out-of-bounds vulnerability can be exploited remotely to execute arbitrary code;
- Buffer overflow vulnerability can be exploited remotely via a specially designed TIFF files to execute arbitrary code;
- Buffer overflow vulnerability can be exploited remotely via a specially designed GoToR string to execute arbitrary code;
- An unknown vulnerability can be exploited remotely via a specially designed PDF file to cause denial of service or execute arbitrary code;
Ursprüngliche Informationshinweise
CVE Liste
- CVE-2016-6169 critical
Mehr erfahren
Informieren Sie sich über die Statistiken der in Ihrer Region verbreiteten Sicherheitslücken statistics.securelist.com
Sie haben einen Fehler in der Beschreibung der Schwachstelle gefunden? Mitteilen!