First published: Thu Oct 03 2019(Updated: )
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 9.5.0.20723. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JPG files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-8838.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Foxit Reader | ||
Foxitsoftware Reader | <=9.6.0.25114 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-13331 is high with a severity value of 7.8.
CVE-2019-13331 allows remote attackers to execute arbitrary code by exploiting a flaw in Foxit Reader's parsing of JPG files, requiring user interaction to visit a malicious page or open a malicious file.
CVE-2019-13331 affects Foxit Reader versions 9.5.0.20723 up to and including 9.6.0.25114.
More information about CVE-2019-13331 can be found in the security bulletins on the Foxit Software website and the advisory on the Zero Day Initiative website.
The Common Vulnerabilities and Exposures (CVE) ID of this vulnerability is CVE-2019-13331.