Foxit Reader 8.3.2.25013 and earlier and Foxit PhantomPDF 8.3.2.25013 and earlier, when running in single instance mode, allows attackers to execute arbitrary code or cause a denial of service via a crafted .pdf file, related to "Data from Faulting Address controls Code Flow starting at tiptsf!CPenInputPanel::FinalRelease+0x000000000000002f.".
References
Link | Resource |
---|---|
https://github.com/wlinzi/security_advisories/tree/master/CVE-2017-14694 | Third Party Advisory |
http://www.securityfocus.com/bid/101009 | Third Party Advisory VDB Entry |
https://www.foxitsoftware.com/support/security-bulletins.php | |
http://www.securitytracker.com/id/1040038 |
Configurations
Information
Published : 2017-09-22 12:29
Updated : 2018-01-04 18:31
NVD link : CVE-2017-14694
Mitre link : CVE-2017-14694
JSON object : View
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
Products Affected
foxitsoftware
- foxit_reader