Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
Foxit PhantomPDF Multiple Remote Code Execution Vulnerabilities
Information
Severity
Severity
Family
Family
CVSSv2 Base
CVSSv2 Base
CVSSv2 Vector
CVSSv2 Vector
Solution Type
Solution Type
Created
Created
Modified
Modified
Summary
The host is installed with Foxit PhantomPDF and is prone to multiple remote code execution Vulnerabilities.
Insight
Insight
The multiple flaws are due to, - The multiple Use-after-free vulnerabilities. - The error in parsing malformed content stream. - The application recursively called the format error of some PDFs and led to no response when opening the PDF. - The destructor of the object whose generation number is -1 in the PDF file could release the file handle which had been imported by the application layer. - The error in decoding corrupted images during PDF conversion with the gflags app enabled. - The XFA's underlying data failed to synchronize with that of PhantomPDF/Reader caused by the re-layout underlying XFA.
Affected Software
Affected Software
Foxit PhantomPDF version 7.3.0.118 and earlier.
Detection Method
Detection Method
Checks if a vulnerable version is present on the target host.
Solution
Solution
Upgrade to Foxit PhantomPDF version 7.3.4 or later.