Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Foxit PhantomPDF 'JavaScript' Remote Code Execution Vulnerabilities (Windows)

Information

Severity

Severity

Medium

Family

Family

General

CVSSv2 Base

CVSSv2 Base

6.8

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:M/Au:N/C:P/I:P/A:P

Solution Type

Solution Type

Vendor Patch

Created

Created

5 years ago

Modified

Modified

4 years ago

Summary

The host is installed with Foxit PhantomPDF and is prone to multiple code execution vulnerabilities.

Insight

Insight

Multiple flaws exists due to, - The user-after-free vulnerability that exists in the JavaScript, When executing embedded JavaScript code a document can be cloned. which frees a lot of used objects, but the JavaScript can continue to execute. - The use-after-free vulnerability found in the Javascript engine that can result in remote code execution.

Affected Software

Affected Software

Foxit PhantomPDF versions before 9.2 on Windows.

Detection Method

Detection Method

Checks if a vulnerable version is present on the target host.

Solution

Solution

Upgrade to Foxit PhantomPDF version 9.2 or later. Please see the references for more information.