First published: Fri Oct 04 2019(Updated: )
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit Reader 9.5.0.20723. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of the util.printf Javascript method. The application processes the %p parameter in the format string, allowing heap addresses to be returned to the script. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. Was ZDI-CAN-8544.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Foxitsoftware Reader | <=9.5.0.20723 | |
Microsoft Windows | ||
Foxitsoftware Phantompdf | <=8.3.10.42705 | |
Foxitsoftware Phantompdf | >=9.0<=9.5.0.20723 | |
Foxit Reader |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-13318 is medium with a severity value of 5.5.
CVE-2019-13318 affects Foxit Reader version 9.5.0.20723 and can allow remote attackers to disclose sensitive information.
The affected software for CVE-2019-13318 includes Foxit Reader version 9.5.0.20723 and Foxit Phantompdf versions between 8.3.10.42705 and 9.5.0.20723.
The Common Weakness Enumeration (CWE) ID for CVE-2019-13318 is 134.
To fix CVE-2019-13318, users should update their Foxit Reader and Foxit Phantompdf software to the latest version available.