The Foxit JPEG2000/JBIG2 Decoder add-on before 2.0.2009.616 for Foxit Reader 3.0 before Build 1817 does not properly handle a fatal error during decoding of a JPEG2000 (aka JPX) header, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a crafted PDF file that triggers an invalid memory access.
References
Link | Resource |
---|---|
http://secunia.com/advisories/35512 | Vendor Advisory |
http://www.vupen.com/english/advisories/2009/1640 | Patch Vendor Advisory |
http://www.kb.cert.org/vuls/id/251793 | Patch US Government Resource |
http://securitytracker.com/id?1022425 | |
http://www.foxitsoftware.com/pdf/reader/security.htm#0602 | Patch Vendor Advisory |
http://www.securityfocus.com/bid/35443 | Patch |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2009-06-23 14:30
Updated : 2009-06-25 21:00
NVD link : CVE-2009-0691
Mitre link : CVE-2009-0691
JSON object : View
CWE
CWE-399
Resource Management Errors
Products Affected
foxitsoftware
- jpeg2000_jbig2_decoder_add-on
- foxit_reader