First published: Thu May 17 2018(Updated: )
This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the bitmapDPI attribute of PrintParams objects. The issue results from the lack of proper initialization of memory prior to accessing it. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. Was ZDI-CAN-5437.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Foxit Reader | <=9.0.1.1049 | |
Foxit PhantomPDF | <=9.0.1.1049 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-1174 is rated as medium, indicating that it can lead to sensitive information disclosure.
To fix CVE-2018-1174, upgrade Foxit Reader or Foxit PhantomPDF to version 9.0.1.1049 or later.
CVE-2018-1174 affects users of Foxit Reader and Foxit PhantomPDF versions prior to 9.0.1.1049.
Yes, user interaction is required for CVE-2018-1174 as the target must visit a malicious page or open a malicious file.
CVE-2018-1174 can potentially disclose sensitive information stored on the user's device.