In Foxit Reader and PhantomPDF before 10.0.1, and PhantomPDF before 9.7.3, attackers can execute arbitrary code via a heap-based buffer overflow because dirty image-resource data is mishandled.
References
Link | Resource |
---|---|
https://www.foxitsoftware.com/support/security-bulletins.php | Vendor Advisory |
Configurations
Information
Published : 2020-09-03 21:15
Updated : 2020-09-09 07:56
NVD link : CVE-2020-12248
Mitre link : CVE-2020-12248
JSON object : View
CWE
CWE-787
Out-of-bounds Write
Products Affected
microsoft
- windows
foxitsoftware
- reader
- phantompdf