First published: Tue Jul 31 2018(Updated: )
This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within ConvertToPDF_x86.dll. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-5756.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Foxit Reader | <=9.1.0.5096 | |
Foxit PhantomPDF | <=9.1.0.5096 | |
Microsoft Windows Operating System |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-11620 is considered a medium severity vulnerability due to its ability to disclose sensitive information.
To fix CVE-2018-11620, update Foxit Reader or PhantomPDF to version 9.1.0.5097 or later.
CVE-2018-11620 is associated with remote exploitation through malicious files or web pages requiring user interaction.
Foxit Reader versions prior to 9.1.0.5097 are affected by CVE-2018-11620.
Microsoft Windows itself is not directly vulnerable to CVE-2018-11620, but the vulnerable software running on it may be.