Description
Multiple serious vulnerabilities have been found in Foxit Reader. Malicious users can exploit these vulnerabilities to cause denial of service, obtain sensitive information or execute arbitrary code.
Below is a complete list of vulnerabilities
- Out-of-bounds access can be exploited remotely via a specially designed TIFF to execute arbitrary code or obtain sensitive information;
- Use-after-free vulnerability can be exploited remotely via a specially designed FlateDecode Streams to execute arbitrary code or obtain sensitive information;
- Out-of-bounds access can be exploited remotely via a specially designed JPEG2000 to execute arbitrary code or obtain sensitive information;
- Memory corruption vulnerability an be exploited remotely via a specially designed JPEG2000 to execute arbitrary code;
- An unknown vulnerability can be exploited remotely via a DLL hijack to execute arbitrary code;
- Out-of-bounds access can be exploited remotely via a specially designed PDF to execute arbitrary code or obtain sensitive information;
- Out-of-bounds read vulnerability can be exploited remotely via a specially designed BMP to obtain sensitive information;
- An unknown vulnerability can be exploited to cause denial of service.
Original advisories
Related products
CVE list
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!