Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Foxit PhantomPDF Multiple Remote Code Execution Vulnerabilities

Information

Severity

Severity

Medium

Family

Family

General

CVSSv2 Base

CVSSv2 Base

6.8

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:M/Au:N/C:P/I:P/A:P

Solution Type

Solution Type

Vendor Patch

Created

Created

8 years ago

Modified

Modified

5 years ago

Summary

The host is installed with Foxit PhantomPDF and is prone to multiple remote code execution Vulnerabilities.

Insight

Insight

The multiple flaws are due to, - The multiple Use-after-free vulnerabilities. - The error in parsing malformed content stream. - The application recursively called the format error of some PDFs and led to no response when opening the PDF. - The destructor of the object whose generation number is -1 in the PDF file could release the file handle which had been imported by the application layer. - The error in decoding corrupted images during PDF conversion with the gflags app enabled. - The XFA's underlying data failed to synchronize with that of PhantomPDF/Reader caused by the re-layout underlying XFA.

Affected Software

Affected Software

Foxit PhantomPDF version 7.3.0.118 and earlier.

Detection Method

Detection Method

Checks if a vulnerable version is present on the target host.

Solution

Solution

Upgrade to Foxit PhantomPDF version 7.3.4 or later.