Foxit Reader 8.3.2.25013 and earlier and Foxit PhantomPDF 8.3.2.25013 and earlier, when running in single instance mode, allows attackers to execute arbitrary code or cause a denial of service via a crafted .pdf file, related to "Data from Faulting Address controls Code Flow starting at tiptsf!CPenInputPanel::FinalRelease+0x000000000000002f.".
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/101009 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1040038 | |
https://github.com/wlinzi/security_advisories/tree/master/CVE-2017-14694 | Third Party Advisory |
https://www.foxitsoftware.com/support/security-bulletins.php |
Configurations
History
No history.
Information
Published : 2017-09-22 19:29
Updated : 2024-02-04 19:29
NVD link : CVE-2017-14694
Mitre link : CVE-2017-14694
CVE.ORG link : CVE-2017-14694
JSON object : View
Products Affected
foxitsoftware
- foxit_reader
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer