First published: Fri Oct 04 2019(Updated: )
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.5.0.20723. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the removeField method when processing watermarks within AcroForms. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. Was ZDI-CAN-8801.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Foxit Software PhantomPDF for Windows | ||
Foxit PhantomPDF | <=8.3.10.42705 | |
Foxit PhantomPDF | >=9.0<=9.5.0.20723 | |
Microsoft Windows | ||
Foxit Reader for Windows | <=9.5.0.20723 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-6776 has been assigned a high severity rating due to its potential to allow remote code execution.
To fix CVE-2019-6776, users should update Foxit PhantomPDF and Foxit Reader to the latest versions that address this vulnerability.
CVE-2019-6776 affects users of Foxit PhantomPDF versions up to and including 9.5.0.20723 and Foxit Reader versions up to 9.5.0.20723.
The attack vector associated with CVE-2019-6776 requires user interaction, such as visiting a malicious web page or opening a malicious file.
Exploiting CVE-2019-6776 can lead to arbitrary code execution on the affected system, potentially compromising sensitive data.