First published: Mon Oct 31 2016(Updated: )
The thumbnail shell extension plugin (FoxitThumbnailHndlr_x86.dll) in Foxit Reader and PhantomPDF before 8.1 on Windows allows remote attackers to cause a denial of service (out-of-bounds write and application crash) via a crafted JPEG2000 image embedded in a PDF document, aka an "Exploitable - Heap Corruption" issue.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Foxit Software PhantomPDF for Windows | <=8.0.5 | |
Foxit Reader | <=8.0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2016-8879 is classified as 'Exploitable - Heap' due to the potential for denial of service caused by an out-of-bounds write leading to application crashes.
To fix CVE-2016-8879, users should upgrade to versions of Foxit Reader or PhantomPDF later than 8.1.
CVE-2016-8879 affects Foxit Reader and PhantomPDF versions up to and including 8.0.5 on Windows.
Yes, CVE-2016-8879 allows remote attackers to exploit the vulnerability through specially crafted JPEG2000 images embedded in PDF documents.
CVE-2016-8879 represents a denial of service attack due to the exploitation of a heap-based buffer overflow.