First published: Tue Mar 14 2017(Updated: )
The ConvertToPDF plugin in Foxit Reader before 8.2.1 and PhantomPDF before 8.2.1 on Windows, when the gflags app is enabled, allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted TIFF image. The vulnerability could lead to information disclosure; an attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Foxit Reader | <=8.2.0.2051 | |
Foxit PhantomPDF | <=8.2.0.2192 | |
Microsoft Windows Operating System |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-6883 is classified as a denial of service vulnerability, which can cause application crashes.
To mitigate CVE-2017-6883, you should update to Foxit Reader version 8.2.1 or higher and PhantomPDF version 8.2.1 or higher.
CVE-2017-6883 affects Foxit Reader versions up to 8.2.0.2051 and PhantomPDF versions up to 8.2.0.2192 on Windows.
CVE-2017-6883 is caused by processing a crafted TIFF image which results in out-of-bounds read leading to application crashes.
While CVE-2017-6883 primarily causes denial of service, it could indirectly lead to information disclosure due to application instability.