Description
Multiple serious vulnerabilities have been found in multiple Foxit products. Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code or obtain sensitive information.
Below is a complete list of vulnerabilities
- Use-after-free vulnerability can be exploited remotely via a specially designed XFA or PDF file to execute arbitrary code;
- An unknown vulnerability can be exploited remotely via a specially designed PDF content to obtain sensitive information;
- An unknown vulnerability can be exploited remotely to execute arbitrary file;
- Out-of-bounds vulnerability at ConvertToPDF module can be exploited remotely via a specially designed TIFF, JPEG, GIF or BMP file to execute arbitrary code;
- Out-of-bounds vulnerability can be exploited remotely to execute arbitrary code;
- Buffer overflow vulnerability can be exploited remotely via a specially designed TIFF files to execute arbitrary code;
- Buffer overflow vulnerability can be exploited remotely via a specially designed GoToR string to execute arbitrary code;
- An unknown vulnerability can be exploited remotely via a specially designed PDF file to cause denial of service or execute arbitrary code;
Original advisories
Related products
CVE list
- CVE-2016-6169 high
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!