First published: Wed Dec 16 2015(Updated: )
Multiple use-after-free vulnerabilities in the (1) Print method and (2) App object handling in Foxit Reader before 7.2.2 and Foxit PhantomPDF before 7.2.2 allow remote attackers to execute arbitrary code via a crafted PDF document.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Foxit Reader | <=7.2.0.722 | |
Foxit PhantomPDF | <=7.2.0.722 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-8580 is classified as a critical severity vulnerability due to its potential to allow remote code execution.
To fix CVE-2015-8580, users should update Foxit Reader or Foxit PhantomPDF to versions 7.2.2 or later.
The affected products for CVE-2015-8580 include Foxit Reader versions up to 7.2.0.722 and Foxit PhantomPDF versions up to 7.2.0.722.
CVE-2015-8580 is a type of use-after-free vulnerability that may lead to arbitrary code execution when handling crafted PDF documents.
CVE-2015-8580 can potentially be exploited by remote attackers using specially crafted PDF documents to execute arbitrary code.